FREE TO VIEW


« Back to News

2019-05-07

AI Will Shape The Future 6G Network

6G will be an enormous step up from 5G and AI will become the enabling force behind a whole new generation of machine intelligence applications.

2019-05-03

Beware Of ‘How To' Guides To The Dark Web

Hacking For Dummies: All you need to get rich quick is some good tutorial material from the Dark Web, right? Wrong.

2019-05-03

Cyber Criminals Are Catching Up With Nation-state Hackers

Sophisticated cyber criminals are starting to franchises their hacking tools and to develop new technology to sell to other cyber criminals.

2019-05-02

Russia Plans To Monitor Internet Access

The 'sovereign Internet law” isolates domestic online traffic by requiring it pass through servers run by the national Internet regulation agency.

2019-05-01

GCHQ Chief Wants A Big Effort To Improve British Cybersecurity

Spy chief Jeremy Fleming says that government, academia and industry in the UK must increase the level of cybersecurity collaboration.

2019-05-01

Authenticating Digital Evidence

With a huge growth of digital media, the question of what types of evidence available to the police that are also admissible in court is complex.

2019-05-01

EU Elections: Facebook Prepares

Facebook is preparing to tackle interference campaigns aimed to misinform and manipulate voters ahead of the EU's elections this month.

2019-04-30

Social Media Crime Is A Threat To Business

Employees are devoting more than three hours per week to sites proven to be hotbeds of malware and that is affecting the businesses they work for.

2019-04-30

Nasty Phishing Scam Targets Instagram

The Nasty List: Instagram is cautioning users not to fall for a widespread phishing scam which is trying to collect log-ins and hack users accounts.

2019-04-30

The IoT Is A Big Headache For Software Developers

Connectivity, performance, and standards are growing areas of concern as the Internet of Things moves from concept to production reality.

2019-04-29

France’s National Cybersecurity Policy: Both Defend & Attack

In a major policy statement the French government says it will use its cyber arms as offensive weapons, as well as to respond an attack.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IGEL Technology

IGEL Technology

IGEL Technology is one of the world's leading thin client vendors. Thin clients increase data security and compliance.

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

Advisera 27001Academy

Advisera 27001Academy

Advisera is a market leader in providing documentation and online support for the implementation of business standards including ISO 27001, ISO 22301 and EU GDPR.

ArcRan Information Technology

ArcRan Information Technology

ArcRan concentrates on developing comprehensive cybersecurity solutions for smart city applications. We believe that cybersecurity is the fundamental enabler of IoT development.

FifthDomain

FifthDomain

We are a specialist cyber security education and training company tackling the global cyber security skills shortage.

Quantifind

Quantifind

Quantifind enables financial crimes/fraud analysts and investigators to make better decisions, faster, with intelligent automation.

Barikat Cyber Security

Barikat Cyber Security

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

Winmill Software

Winmill Software

Winmill is a technology services company that provides expert consulting services in Application Development, Application Security and Cyber Security.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

Apex

Apex

We aspire to make the AI revolution run faster, securely, for the benefit of all. We are purposely built for the new AI era and are creating capabilities to safely enable AI.

PrimeSSL

PrimeSSL

PrimeSSL, a leading Certificate Authority (CA) backed by the trusted Sectigo Root, delivers affordable and user-friendly SSL/TLS certificate solutions.

ecfirst

ecfirst

ecfirst's mission is to establish AI platforms and service capabilities to assess and manage client compliance with global mandates on a continual basis to secure business data and assets.