FREE TO VIEW


« Back to News

2019-08-09

IBM X Force Dissect The Destructive Power Of Malware

Organisations previously thought safe from this form of cyber aggression increasingly find themselves affected, either directly or indirectly.

2019-08-08

Five New Security Trends Relevant To Your Business

Companies should be on the lookout for emerging technologies and processes that can protect their data from increasingly sophisticated threats.

2019-08-07

Fraudsters Target Social Media Influencers

Social media 'influencers' and other celebrities are being duped into endorsing bogus products, services and fake investment opportunities.

2019-08-07

British Army Reshapes Itself To Fight Cyberwars

Computer hackers and propaganda specialists are to form 6th Division, reflecting a doctrine that the boundaries between peace and war are fading.

2019-08-06

More About The Capital One Breach

Details are emerging about the massive breach affecting over 100 million credit card customers of CapitalOne, which first went unnoticed.

2019-08-06

Surge Of Attacks On Banking & Finance Using N Korean Tools

The experts at F-Secure say the threat landscape for the financial sector might be getting even worse as criminals use nation-state hacker tools.

2019-08-06

Cyber Terrorism & Piracy

Terrorism today is a widening series of global alliances, supported and connected via social media and fake news. By Alfred Rolington

2019-08-06

Malware Attacks Drop As Encrypted Attacks Increase

Malware is down, but it's getting more malicious in terms of the type of malware and how it is delivered. Ransomware is now a SAAS offering.

2019-08-05

The Cyber Effect On Modern Warfare

The recent US retaliatory cyber-attack on Iran demonstrates that offensive cyber operations are now an integral arm of statecraft.

2019-08-05

We Can Reduce Cybercrime, But Why Are We Failing?

Devin Smith puts cybercrime under a magnifying glass, intending to combat or at least limit the malicious practices of criminal malpractitioners.

2019-08-01

Do Criminals Dream Of Electric Sheep?

EUROPOL thinks that cutting edge technologies, including AI, 5G, Quantum computing and the Internet of Things will all benefit cybercrime.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

WIRED

WIRED

WIRED is the magazine about what's next – the people, the trends and the big ideas that will change our lives. Topics covered include cyber security.

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

Zecurion

Zecurion

Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest and in motion.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

TechBeacon

TechBeacon

TechBeacon.com is a digital hub by and for software engineering, IT and security professionals sharing practical and passionate guidance to real-world challenges.

Cylera

Cylera

Cylera is a Healthcare IoT cybersecurity and intelligence company built in close partnership with healthcare providers.

Berkeley Varitronic Systems (BVS)

Berkeley Varitronic Systems (BVS)

Berkeley Varitronics Systems is an engineering think tank delivering custom wireless RF engineering products and solutions including cyber security.

Ostra Cybersecurity

Ostra Cybersecurity

As a next-generation MSSP, Ostra Cybersecurity combines best-in-class tools, proprietary technology and exceptional talent to deliver Fortune 100-level protection for businesses of all sizes.

Cloud4C

Cloud4C

Cloud4C is a leading automation-driven, application focused cloud Managed Services Provider.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

Deutsche Gesellschaft für Cybersicherheit (DGC)

Deutsche Gesellschaft für Cybersicherheit (DGC)

As a leading provider of cyber security, DGC supports companies in taking advantage of the opportunities offered by the digital transformation – and in minimizing the associated risks.

Baselime

Baselime

Baselime, the cloud-native observability platform. Resolve issues in your cloud application before they become problems.

Cloudbox

Cloudbox

Cloudbox build and maintain a highly secure, compliant IT infrastructure for our clients – with total peace of mind – so they can focus on the market.

Dream

Dream

Dream is developing an AI platform that enables cyber resilience and protects nations from hostile nation-states cyber attacks.