FREE TO VIEW


« Back to News

2019-04-23

FBI Believes Russia Hacked Florida Elections

Russian hackers breached “at least one” Florida county government using a spearphishing campaign according Robert Mueller’s report.

2019-04-17

AOC Gives Up On Facebook

The penny drops with Millennials, as the youngest woman in the US Congress announces she is dropping Facebook and attacks its management.

2019-04-18

AI Can Transform Marketing. Why Isn’t Your Business Using It?

AI and machine learning will fuel the future of the data and marketing industry. If you aren't using them, be sure your competitors certainly will be.

2019-04-17

Attacks On UK Business & Charities Are Decreasing

The latest UK Cyber Breaches Survey shows that 32% of businesses identified a cyber attack, down from 43% the previous year, thanks to GDPR.

2019-04-17

Distinguished AI Expert Is Concerned About ‘Killer Robots’

A winner of the Turing Prize for mathematics, Prof. Yoshua Bengio, worries that AI technology could lead to a dark future with autonomous weapons.

2019-04-16

A Cybersecurity Guide For Small Business

Small business is just as much at risk as much bigger organisations. Canada's national Cyber Security Centre has produced valuable guidance.

2019-04-16

America Remains Vulnerable To Cyber Attack

Ex-CIA chief issues a warning that plans to protect the electric grid distract from the real solutions that would protect US critical infrastructure.

2019-04-15

US Head of Homeland Security’s Departure Raises Questions

Kirstjen Nielsen made cybersecurity a top priority and there are concerns as to whether her permanent replacement will do the same.

2019-04-18

Banks Are Making It Easy For Hackers

Online banking currently has many critical cyber security vulnerabilities with very low levels of protection. Over 50% of transactions are at risk.

2019-04-15

Thales Spends £4.8Bn To Deliver Full - Range Cybersecurity

Thales aims to become a global leader and deliver complete end-to-end cyber security for the Internet of Things, cloud and mobile security.

2019-04-15

National Teams Engage In NATO’s Annual Cyber Challenge

In the exercise scenario,a fictitious country faces coordinated cyber-attacks against its civilian infrastructure, while holding national elections.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise.

Cysec - TU Darmstadt

Cysec - TU Darmstadt

CYSEC is the Cybersecurity faculty of the Technical University of Darmstadt and performs internationally renowned research in numerous areas of cybersecurity.

Airbus Cybersecurity

Airbus Cybersecurity

Airbus CyberSecurity is a European specialist in cyber security. Our mission is to protect governments, military and critical national infrastructure enterprises from cyber threats.

Approachable Certification

Approachable Certification

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards.

Stage2Data

Stage2Data

Stage2Data is one of Canada’s most trusted cloud solution providers offering hosted Backup and Disaster Recovery Services.

The Cyber AB

The Cyber AB

The Cyber AB is the official accreditation body of the Cybersecurity Maturity Model Certification (CMMC) Ecosystem.

Spin Technology

Spin Technology

SpinOne is a SaaS data protection platform designed to monitor, secure, and back up your G Suite and O365 data, improve compliance, and reduce IT costs.

Cynance

Cynance

Cynance are an award-winning, independent cyber security specialist and part of the Transputec family of companies.

StoneLock

StoneLock

StoneLock is a trusted leader in the design and manufacture of facial recognition software and technology.

eMazzanti Technologies

eMazzanti Technologies

eMazzanti Technologies provides IT consulting services for businesses ranging from home offices to multinational corporations throughout the USA and internationally.

Kriptos

Kriptos

Kriptos helps businesses improve their cybersecurity, risk, and compliance strategies by locating critical information through a technology that automatically classifies and labels documents using AI.

Armolon

Armolon

Armolon provides comprehensive data breach and cybersecurity, as well cybersecurity audits and certifications, and disaster recovery/business continuity services to clients.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.

Adaptiva

Adaptiva

Adaptiva, the autonomous endpoint management company, delivers the fastest way to patch and manage endpoints at scale.

Genix Cyber

Genix Cyber

Genix Cyber provides world-class cybersecurity services that protect systems, cloud applications, infrastructure, critical data, and networks from evolving cyber threats.