FREE TO VIEW


« Back to News

2019-03-27

NASA’s Poor Cybersecurity Is An Operational Threat

Serious deficiencies in NASA’s information security program include inaccurate data in system security plans and delays in control assessments.

2019-03-27

What's The Difference Between AI And Machine Learning?

Artificial intelligence and machine learning are often lumped together and its easy for people to mistake them as synonymous. They are not.

2019-03-26

LinkedIn Used As The Vehicle For A Global Scam

The experts at Digital Shadows have highlighted how the leading social media platform for business professionals can be used illegally for extortion.

2019-03-26

US Cyber Command Can Cut Russian Troll Access

A US military agency successfully blocked the Internet access of a Russian firm believed to be trying to influence the 2018 US midterm elections.

2019-03-26

Cyber Criminals Are Changing Their Methods

Increased security measures and awareness are driving cyber-criminals to alter their techniques in search of a better return on investment.

2019-03-26

US Surveillance System Exposed By Snowden Goes Dormant

A US surveillance programme whose forerunner was exposed by Edward Snowden has not been used for six months and is unlikely to be renewed.

2019-03-25

Half Of UK Businesses Have Fallen For Phishing Attacks

Phishing emails are a common attack technique deployed in hacking campaigns which attempt to lure victims into disclosing sensitive information.

2019-03-25

Three In Five Politicians’ Websites Don’t Use Cyber Security

A wide survey of politicians' websites across 37 countries finds that over 60% lack basic security measures.

2019-03-25

The US Navy Is Leaking Secrets

The US Navy is aware of cyber-attacks by foreign hackers but has failed to effectively respond or to warn its defense contractors of the danger.

2019-03-25

WordPress Comprises 90% Of Hacked Sites

WordPress accounts for the vast majority of compromised CMS platforms, with vulnerable plugins the prime attack vector.

2019-03-23

Bank of England Testing Banks' Cyber Resilience

Britain's banks will have to show they could recover from a cyber-attack within hours to avoid customer payments being delayed.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Identity Theft Resource Center (ITRC)

Identity Theft Resource Center (ITRC)

ITRC is a non-profit organization established to empower and guide consumers, victims, business and government to minimize risk and mitigate the impact of identity compromise and crime.

World Privacy Forum (WPF)

World Privacy Forum (WPF)

The World Privacy Forum is a non-profit public interest research group that focuses on privacy and technology issues.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

FTAPI Software

FTAPI Software

FTAPI SecuTransfer is a software solution for end-to-end encrypted data exchange of large and sensitive data with customers and partners.

Telelogos

Telelogos

Telelogos is a European provider of Enterprise Mobility Management software, Digital Signage software and Data Transfer and Synchronization software.

Keynetic Technologies

Keynetic Technologies

Keynetic focuses on developing cybersecurity solutions for Industry 4.0.

Healthcare Fraud Shield (HCFS)

Healthcare Fraud Shield (HCFS)

The focus of Healthcare Fraud Shield is solely on healthcare fraud prevention and payment integrity with a successful approach based on many unique advantages we deliver to our clients.

Option3

Option3

Option3 (formerly Option3Ventures - O3V) primarily seek control investments in the growing cybersecurity mid-market, seeking to build champions with the scale to bring cutting-edge products to market.

BridgingMinds Network

BridgingMinds Network

BridgingMinds Network is an industry leading best practices and IT security training provider in Singapore.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

RAND Corporation

RAND Corporation

The RAND Corporation is a non-profit institution that helps improve policy and decision making through research and analysis.

EmberOT

EmberOT

EmberOT is at the forefront of operational technology (OT) security, offering cutting-edge solutions designed to protect critical infrastructure within energy, utilities, and manufacturing sectors.

Skylark

Skylark

Skylark is a leading global IT services provider, transforming client’s businesses through innovative and advanced technology solutions.

Syntura

Syntura

Syntura is your trusted partner for advisory, infrastructure and managed services.

Obviam

Obviam

Obviam specialize in providing security solutions tailored to meet the unique needs of each of our clients, no matter where they are in their security journey.