FREE TO VIEW


« Back to News

2020-03-06

US Increases Pressure To Stop Huawei 5G In Britain

The US does not think the UK’s decision to allow Huawei to buy 5G technology is final and is keeping up the pressure to change its mind.

2020-03-11

Cyber Crime Methods Are Evolving

Criminals are quickly developing new tools and techniques to take advantage of changes in the ways consumer and businesses behave.

2020-03-11

The Global Cyber Security Market Will Be Worth $280b By 2027

The cybersecurity market is booming: The cyber hotspot continues to attract founders and investors alike, with 300+ new startups launching every year.

2020-02-28

WEBINAR: How to prioritize security controls for situational awareness in AWS

Thursday, March 12, 2020 | Join AWS Marketplace and Sounil Yu to discover ways to strengthen your foundational controls & security posture in AWS.

2020-02-27

McLaren F1 Racing Are Cyber Secure With Darktrace

The McLaren F1 racing team will use AI-driven cyber security technology from Darktrace to monitor on-board IoT via its cloud-based backend.

2020-02-26

Organisations Are Adopting AI For Cyber Security

Over 70% of organisations are currently testing use cases for cyber security driven by Artificial Intelligence across a wide range of applications.

2020-02-24

Hamas Hackers Use New Malware

Hamas, the Islamist political group that runs Gaza, are using new high-tech malware in campaigns against the local Palestinian Authority.

2020-03-10

The Cyber Security Workforce Must Grow 145%

Although cyber security training is increasing there remains an acute skills shortage and the expert cyber workforce urgently needs to get bigger.

2020-02-26

Cyber Security Warnings For US 2020 Election

Security experts warn that government agencies are under attack and that hackers are very likely to focus on the forthcoming US Presidential election.

2020-03-10

90% Of Breaches Are Caused By Human Error

Analysis of data from the UK Information Commissioner’s Office shows that human error caused 90% of data breaches last year.

2020-02-25

Russia Denies That It Attacked Georgia

Georgia says that Russian military intelligence has launched a massive cyber-attack on their government and business organisations.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

L3Harris United Kingdom

L3Harris United Kingdom

L3Harris UK (formerly L3 TRL Technology) designs and delivers advanced electronic warfare and cyber security solutions for the protection of people, infrastructure and assets.

Applause

Applause

Applause provides real-world software testing for functionality, usability, accessibility, load, localization and security.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

SecurePay

SecurePay

SecurePay is Australia's premier payment gateway, with a range of secure online payment solutions for online retailers, SMEs and enterprise businesses.

Tessian

Tessian

Tessian (formerly CheckRecipient) is a next-generation email security platform that helps enterprises counteract human error and significantly reduce the risk of data loss.

Gulf Computer Services Co (GCSC)

Gulf Computer Services Co (GCSC)

Gulf Computer Services is a major player in the field of networking & Communication solutions for emerging industries such as Internet Services and Information Technology in Saudi Arabia.

LaoCERT

LaoCERT

LaoCERT is the national Computer Incident Response Team for Laos.

Risk Ident

Risk Ident

RISK IDENT specializes in supporting enterprises in identifying and preventing criminal activity like payment fraud, account takeovers and identity theft.

RiskRecon

RiskRecon

RiskRecon makes it easy to gain deep, risk contextualized insight into the cybersecurity risk performance of all of your third parties.

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

SAIFE

SAIFE

SAIFE has adapted a Software Defined Perimeter approach and paired it with a Zero Trust model that defines access by the user, their device, and where they are located.

Lightspin

Lightspin

Lightspin is a contextual cloud security platform that continuously visualizes, detects, prioritized, and prevents any threat to your cloud stack.

Onesecure Asia

Onesecure Asia

ONESECURE Asia’s expertise and services are built around its mission to provide reliable, robust and scalable technology solutions to cater for its customers’ needs.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

Computer Futures

Computer Futures

Computer Futures are a global specialist IT recruitment partner, matching candidates with roles across niche IT markets and core technologies.

Blue Goat Cyber

Blue Goat Cyber

Blue Goat stands at the forefront of cybersecurity, particularly in medical device security and penetration testing.