FREE TO VIEW


« Back to News

2019-08-28

US Army To Focus On Information Warfare

US Army commanders will all have a dedicated team of cybersecurity professionals to handle electronic and information warfare.

2019-08-26

Ransomware Hits Texas For Six

Over 20 local governments have suffered a co-ordinated attack from somebody who is demanding a $multimillion ransom.

2019-08-27

The EU's New Cybersecurity Certification Framework

A new Cybersecurity Certification scheme covers use of network & information systems by citizens, organisations & businesses across the EU.

2019-08-27

Psycho-Cyberchology

Organisations fighting against cybersecurity breaches have a new weapon: Cyberchology, psychometric tests to find safer personality types.

2019-08-27

Securing Your Organisation’s Office 365 Environment

If your business uses O365 or is considering migrating to the service, here’s some top tips to help keep your business secure. By Chester Avey.

2019-08-26

Cyber Crime In Britain

The UK National Crime Agency say Russian cyber groups are threatening UK interests, but home-grown cyber criminals are a rising threat.

2019-08-24

Best UK Cyber Jobs Without A Degree

Getting Ahead: The demand for cyber skills is opening up numerous well- paid job opportunities for non-graduates.

2019-08-23

What’s On The Dark Web?

The normal web is just a small part of the Internet. Using Tor, you can get access, but what are the issues around visiting the Dark Web?

2019-08-21

Pakistan Clashes With India In Cyberspace

Pakistan has unleashed a social media campaign to promote anti-India propaganda following a disagreement over the region of Kashmir.

2019-08-21

Over 60% of Enterprises Fail to Build Effective Cloud Security

Over half of organisations are using cybersecurity methods that fail to keep pace with the changes and up-grades that their cloud security requires.

2019-08-21

Cyberwar Between Nation-States Damages Business

Businesses are at risk of becoming “collateral damage” in nation-state cyber conflicts and need to be protected in a fundamentally new way.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Mitol PerfectBackup

Mitol PerfectBackup

Mitol PerfectBackup provide Enterprise Online Backup, Disaster Recovery and Cloud Computing Services.

Deep Identity

Deep Identity

Deep Identity is a boutique system integrator, with expertise in tailored identity governance & administration (IGA) and identity access management (IAM) solutions.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Subex

Subex

Subex leverages its award-winning telecom analytics solutions in areas such as Revenue Assurance, Fraud Management, Asset Assurance and Partner Management, and IoT Security.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

LaoCERT

LaoCERT

LaoCERT is the national Computer Incident Response Team for Laos.

ThreatModeler

ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s Software Development Lifecycle by identifying, predicting and defining threats.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

StateRAMP

StateRAMP

StateRAMP reduces risk from unsecure cloud solutions and protects data by providing State and local governments a standardized approach for verifying and monitoring security postures.

Privacy Compliance Hub

Privacy Compliance Hub

Privacy Compliance Hub provide an easy to use platform with a comprehensive data protection compliance programme including training, information, templates and reporting.

Distology

Distology

Distology are an award-winning cloud security distributor bringing a wealth of experience and strong relationships with a huge breadth of partners covering the UK, Ireland and Benelux.

Single Point of Contact

Single Point of Contact

Single Point of Contact is a Managed IT Services provider that helps businesses to achieve a seamless and secure IT environment.

Star Lab

Star Lab

Star Lab specializes in the development and productization of embedded security technologies.

Trovent Security

Trovent Security

Trovent was founded with a clear goal: to support medium-sized companies in significantly increasing their IT security level.

Canary Technology Solutions (Canary IT)

Canary Technology Solutions (Canary IT)

A Cloud, Cyber Security, Retail Solutions and Managed IT Services provider for over 25 years, we safeguard and revolutionise business through technology and foresight.