FREE TO VIEW


« Back to News

2019-07-09

Improving Electric Power-Grid Security

Going Backwards To Go Forwards: US legislators want to mandate 'retro' analogue control systems in US Power stations to improve cyber-resilience.

2019-07-10

Blockchain Will Be A Trusted Military Solution

Militaries worldwide want to leverage the super secure nature of blockchain technology in their communications.

2019-07-09

China’s Dirty Secret - Intellectual Property Theft

Hackers have stolen masses of corporate and government secrets, with the aim to improve Chinese business and economic competitiveness.

2019-07-08

Phishing, Malware & Cyber Security in Australia

More robocalls, more suspicious emails and decreased cyber security. Australians find themselves in the frontline against cyberecrime.

2019-07-08

Cyber Attacks On The British Financial Sector Increasing Fast

A significant rise in outages and cyber-attacks affecting financial services firms over the past year suggests there are some fundamental problems.

2019-07-08

Developing Smart Cities In Practice

Security and privacy issues plus a lack of IoT interoperability are seen as a major factors in speeding deployment of Smart City technology.

2019-07-05

20m Jobs Will Become Robotic By 2030

The impact of automation, AI and the IoT will be huge. One forecast is for 20 million fewer jobs and 500 billion connected devices in 2030.

2019-06-25

Clayden Law: GPPR Is 1-Year Old

An Guide To GDPR From Clayden Law: Experts in Information Technology, Data Privacy & Cyber Security.

2019-07-04

Iran’s Cyber Threat to Germany

Tehran is emerging as a major cyber security threat to Germany and the West, the German intelligence service has warned.

2019-07-03

30% Of Business Leaders Would Pay Ransom

A third of organisations would consider paying a ransom to an attacker instead of investing in cybersecurity, as they believe it is cheaper.

2019-07-03

Malboard Exploit Mimics A User’s Keystrokes

Malware researchers have developed a new attack method which avoids detection by mimicing a user’s personalised keystroke characteristics.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BruCERT

BruCERT

BruCERT is the referral agency for dealing with computer-related and internet-related security incidents in Brunei Darussalam.

Total Defense

Total Defense

Total Defense solutions include anti-malware, anti-virus, intrusion prevention & mobile security.

Office of the National Security Council (UVNS) - Croatia

Office of the National Security Council (UVNS) - Croatia

UVNS coordinates, harmonizes the adoption and controls the implementation of information security measures and standards in the Republic of Croatia.

Project Moore

Project Moore

Project Moore is an Amsterdam law firm specialising in IT-law and privacy.

Japan Cybersecurity Innovation Committee (JCIC)

Japan Cybersecurity Innovation Committee (JCIC)

JCIC is an independent and not-for-profit thinktank to establish a secure and safe digital society.

GELLIFY

GELLIFY

GELLIFY is the first innovation platform dedicated to the high-tech B2B market, supporting start-ups and companies.

Orchestra Group

Orchestra Group

Orchestra Group offer a unique integrated cybersecurity defense platform with proactive security policy management and enforcement orchestration.

MONITORAPP

MONITORAPP

MONITORAPP is responsible for complete web security. Protect your business environment with Application Security Solutions from MONTORAPP.

National Institute for Research & Development in Informatics (ICI Bucharest) - Romania

National Institute for Research & Development in Informatics (ICI Bucharest) - Romania

ICI Bucharest is the most important institute in the field of research, development and innovation in information and communication technology (ICT) in Romania.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

Binalyze

Binalyze

Binalyze is the world's fastest and most comprehensive enterprise forensics solution. Our software helps you to collaborate and complete incident response investigations quickly.

Brennan IT

Brennan IT

For over 25 years, Brennan’s expert team has helped businesses achieve real success through innovative and secure technology solutions.

Blockfence

Blockfence

Blockfence are a seasoned crew versed in enterprise-grade cybersecurity and crypto, on a mission to collaboratively shape the future of Web3 security.

Cybervergent

Cybervergent

Cybervergent (formerly Infoprive) are a leading cybersecurity technology company in Africa. We provide cybersecurity guidance and solutions that help protect your business.

Closed Door Security

Closed Door Security

Closed Door Security is the only cybersecurity team in the north of Scotland offering everything from IASME Certification to CREST-Accredited penetration testing.