FREE TO VIEW


« Back to News

2019-11-01

GDPR Lessons Learned

Uncertainty and contradictions have defined the first year of General Data Protection Regulation (GDPR) enforcement. By Simon Fogg

2019-11-01

Cyber Intelligence & Business Strategy

The planet’s interconnected population will grow from 3.7 to 5 billion over the next 10 years and this has profound consequences for business.

2019-10-31

Facebook, Free Speech & Fake News

Arbiters Of Truth: Twitter's decision to cease political advertising renews pressure on Facebook to control the flow of fake news across its platform.

2019-10-30

Facebook Sues Over Spyware Planted On WhatsApp

Facebook turns aggressive and has filed legal action in California against Israeli NSO Group for allegedly hacking WhatsApp.

2019-10-30

Georgia Suffers A Nationwide Cyber Attack

The national TV station, justice system, thousands of websites including private companies, knocked offline and replaced with a threatening message.

2019-10-30

Google Claims Quantum Supremacy

The race to build the world's first useful quantum computer is nearing its end. Google are claiming victory over IBM. Why is that important?

2019-10-29

NCSC Stopped One Million Criminal Frauds

Britain's national cyber defence centre has thwarted more than one million cases of suspected payment card fraud in the last year.

2019-11-13

WEBINAR: How to Build a Threat Hunting Capability in AWS

November 21 | Do you know how to build an effective threat hunting program in your AWS environment? Learn from SANS and AWS experts.

2019-10-28

The Next Industrial Revolution

A fusion of technologies is blurring the lines between the physical, digital and biological spheres. Its a revolution.

2019-10-28

Cyber Insurance Will Reshape Cyber Security

Insurance firms with the best understanding of cyber security risk will spur businesses to take the actions needed to withstand attacks.

2019-10-28

British Government Funds Chip Maker To Build Cyber Resilience

The UK is partnering with Arm to develop new chip technologies that are more resistant to cyber threats, backed by £36 million in funding.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

Foundation for Strategic Research (FRS)

Foundation for Strategic Research (FRS)

The Foundation for Strategic Research is France's main independent think tank on strategic, defense and security issues. Cyber security is covered as part of the study areas.

Truth Technologies Inc (TTI)

Truth Technologies Inc (TTI)

TTI is a premier provider of worldwide anti-money laundering, anti-fraud, customer identification, and compliance products and services.

AAROH

AAROH

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & fraud.

SCADASUDO

SCADASUDO

SCADASUDO is a cyber solution architecture and design office, established by leading experts in the field of OT (Industrial control) and IT (information Technology).

Quantstamp

Quantstamp

Quantstamp are experts in Smart Contract Security Audits. We provide verification that your decentralized system works as intended.

JobStreet.com

JobStreet.com

JobStreet is one of Asia’s leading online employment marketplaces in Malaysia, Philippines, Singapore, Indonesia and Vietnam.

Cypherix

Cypherix

Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages.

Security Management Partners (SMP)

Security Management Partners (SMP)

Security Management Partners (SMP) is a trusted partner to financial services, healthcare and businesses that need to manage their information, securely.

Spamhaus

Spamhaus

Spamhaus is the world leader in supplying realtime highly accurate threat intelligence to the Internet's major networks.

National Academy of Cyber Security (NACS) - India

National Academy of Cyber Security (NACS) - India

National Academy of Cyber Security provides Professional Training Courses and Programmes in Cyber Security.

BlockSec

BlockSec

BlockSec is dedicated to building blockchain security infrastructure. The team is founded by top security researchers and experiencedexperts from both academia and industry.

FutureRange

FutureRange

Specialising in IT Managed Services, Cybersecurity and Digital Transformation, FutureRange experts provide professional IT services for clients throughout Ireland and beyond.

American Binary

American Binary

American Binary is a Quantum Safe Networking (TM) and post-quantum encryption company.

TeamT5

TeamT5

TeamT5 Inc. is a leading cybersecurity company dedicated to cyber threat research and solutions.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.

DeepSurface Security

DeepSurface Security

DeepSurface is the first risk-based vulnerability management platform that allows cybersecurity teams to automate the process of analyzing and prioritizing vulnerabilities.