FREE TO VIEW


« Back to News

2019-05-22

Huawei Offers A 'No-Spy' Agreement

Bending to multinational pressure, Huawei's chairman say he's "willing to sign no-spy agreements with governments", including the UK.

2019-05-22

Five Tech Giants Promise To Stop Terrorist Content

Facebook, Amazon, Google, Twitter and Microsoft agree to develop shared tools to detect and remove terrorist or extremist content.

2019-06-06

Big-Data Analytics Risks Becoming Jammed

Big data Analytics are becoming core for almost any activity in the business, government, and security sectors.But is there just too much data?

2019-05-29

Is The US Planning A Cyber Attack On Iran?

A pre-emptive cyber-attack could be be a way for the US to hit Iran, without the need for attacks using conventional forces.

2019-06-06

Cyber Command Knows Its Tools Can Also Be Used By Their Targets

US Cyber Command leaders understand that the cyber weapons that they have made to attack their enemies might also be turned against them.

2019-06-06

Two Years After WannaCry Severe Risks Remain

A single vulnerable and an internet-exposed system was enough to wreak havoc, yet with over a million devices still unpatched, the risks remain.

2019-06-05

Digital Advertising Is A $Billion Ripoff

Internet advertising revenues are booming, worth over $100 billion in the US alone, but lying behind this is a hotbed of malware and fraud.

2019-06-05

A Predictive Tool For Armed Police

Police will soon be able to use behavioral data and get warning signs that an armed police officer may be about to go off the rails.

2019-06-04

US Army Identifies How To Improve Cybersecurity

US Army researchers have developed a tool that limits damage caused by malicious traffic, cutting it off after a given number of messages are sent.

2019-05-30

WannaCry Hero Deserves a Pardon, Not A Conviction

Marcus Hutchins, the so-called 'Wannacry Hero' faces up 10 years in prison but could receive a more lenient sentence for accepting responsibility.

2019-05-29

The US Can't Stop China Copying Its Cyber Weapons

China is copying the malware that the NSA developed to use against them. Is this preventable or is it an inherent weakness of cyber warfare?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ID-SIRTII/CC

ID-SIRTII/CC

Security Incident Response Team for Internet Infrastructure in Indonesia.

Bastille

Bastille

Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, cellular, IoT) in your organization.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

Alan Boswell Group

Alan Boswell Group

We are a Group of Companies providing specialist Insurance Broking and Risk Management advice and services including Cyber Risk cover.

Rippleshot

Rippleshot

Rippleshot is a fraud analytics firm that detects mass card compromises faster, allowing issuers to execute more proactive fraud detection strategies.

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions provides advanced, innovative data security solutions for enterprises, professionals and individuals.

Tier1Asset (T1A)

Tier1Asset (T1A)

T1A is Europe’s leading IT refurbisher. We offer certified data erasure using blancco on site and at our facilities, providing environmentally sound disposal of your used equipment.

Center for Cyber & Homeland Security (CCHS)

Center for Cyber & Homeland Security (CCHS)

The Center for Cyber and Homeland Security at Auburn University is a nonpartisan think tank that works to develop innovative strategies to address current and future threats to the United States.

Monster Jobs

Monster Jobs

Monster is a global leader in connecting people to jobs, wherever they are. Monster covers all job sectors including cybersecurity in locations around the world.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

Anthony Timbers LLC

Anthony Timbers LLC

Anthony Timbers is a cybersecurity consulting and penetration testing firm providing services to the Federal and Commercial sectors nationwide.

Wisetek

Wisetek

Wisetek is a global provider of end-to-end IT Asset Disposition (ITAD), reuse and secure data destruction management services to the world’s leading IT Corporations, data centres and manufacturers.

NetScout Systems

NetScout Systems

NetScout assures digital business services against disruptions in availability, performance, and security.

Redpoint Cybersecurity

Redpoint Cybersecurity

Redpoint Cybersecurity is a human-led, technology-enabled managed cybersecurity provider specializing in Digital Forensics, Incident Response and proactive cyberattack prevention.

Espria

Espria

Espria is a leading independent managed service provider with expertise in Cloud, IT, Communications and Document Solutions.

Realm.Security

Realm.Security

Realm.Security is pioneering the creation of an easy-to-implement, simple-to-use security fabric solution that is purpose-built for cybersecurity.