FREE TO VIEW


« Back to News

2019-10-28

UK Workforce Lacks Basic Cyber Training

Over 75%of British workers surveyed say they have not had even basic training in cyber security. Over 25% use one password for multiple accounts.

2019-10-28

False Flag: Russian Hackers Hijack An Iranian Group

Russian hackers used Iranian cyber tools and digital infrastructure to attack government and industry groups in dozens of countries.

2019-10-25

Protect Your Organisation From Employee Data Theft

Too few organisations pay attention to the risk that their own employees present to data security, be it by accident or by intention.

2019-10-24

The Cyberthreat Handbook

Reading List: Thales and Verint have produced an analysis of the activities of approximately 60 major groups of cyber attackers throughout the world.

2019-10-24

Happy Days Ahead For 5G Hackers

Fifth-generation mobile networks are going live with greatly improved latency & bandwidth. They also offer hackers greatly more potential for attack.

2019-10-23

E-Passports Can Be Remotely Hacked

A newly discovered flaw in the chip contained in e- passports lets data thieves remotely scan the passport then track the holder’s every movement.

2019-10-23

Less Than Half Of Employees Get Regular Cyber Security Training

As techniques to exploit vulnerabilities continue to become more sophisticated, businesses must train their people to practice cyber security.

2019-10-23

Small & Medium Businesses Are Under Increasing Risk Of Attack

Small businesses are just as at risk as big ones. If you are a vulnerable target there will be a hacker interested, no matter how small you are.

2019-10-23

Reduce Business Disruption - Make Cyber Security A Priority

Half of security experts in the manufacturing & utilities sectors surveyed say that their organisations don't invest enough in cyber security.

2019-10-22

Just A Normal Day At The Office For Huawei

Huawei reveals that it suffers a million cyber-attacks every day, focused on stealing aspects of its leading 5G network technology.

2019-10-22

Cybersecurity And The EU's Regime For 5G Networks

The powerful new features of 5G networking will bring numerous security challenges. A lot will depend on regulatory compliance. By Joao Paro

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

AusCERT

AusCERT

AusCERT is the premier Computer Emergency Response Team (CERT) in Australia and a leading CERT in the Asia/Pacific region

Cyber Command

Cyber Command

Our Managed IT service allows clients to offload the management of day-to-day computer, server, and networking support to our team of professionals.

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

Apricorn

Apricorn

Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest.

Compass Security

Compass Security

Compass Security is a specialist IT Security consultancy firm based in Switzerland. Services include pentesting, security assessments, digital forensics and security training.

Chronicle

Chronicle

Chronicle products combine intelligence about global threats in the wild, threats inside your network, and unique signals about both.

Moxa

Moxa

Moxa is a leading provider of industrial networking, computing, and automation solutions for enabling the Industrial Internet of Things.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

LeadingIT

LeadingIT

Leading IT provides IT support, cloud computing, email support, cybersecurity, networking and firewall services to Chicagoland businesses.

Netlinkz

Netlinkz

Netlinkz has developed the Virtual Secure Network (VSN) overlay technology platform, a breakthrough in connectivity security, speed, and simplicity.

stackArmor

stackArmor

stackArmor specializes in compliance and security-focused solutions delivered using our Agile Cloud Transformation (ACT) methodology.

Flexxon

Flexxon

Flexxon is the industry leader to develop NAND flash storage devices. Our key focus is to innovate memory devices ensuring data security and reliability.

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.

Obsidian Security

Obsidian Security

Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS.

42Crunch

42Crunch

42Crunch provides API security testing and threat protection. We proactively test, fix and protect your APIs from development to runtime.

Genix Cyber

Genix Cyber

Genix Cyber provides world-class cybersecurity services that protect systems, cloud applications, infrastructure, critical data, and networks from evolving cyber threats.