FREE TO VIEW


« Back to News

2018-12-04

Selecting The Right SCADA Technology

Modern SCADA technologies offer choices that satisfy functionality and security requirements while improving performance for remote users.

2018-12-03

Five Trends In Attacks On Industrial Control Systems

Attacks on industrial control systems are up, according to Kaspersky and Symantec. The attack data reveals five specific trends.

2018-11-29

Facebook's Sheryl Sandberg Is 'Tainted' By Crises

As the problems swirling around Facebook gain force, some insiders think that COO Sheryl Sandberg may end being handed the blame.

2018-11-29

Google Challenged Over Location Tracking

Seven consumer groups have filed complaints against Google with national regulators, alleging that user location tracking is in violation of GDPR.

2018-11-29

Uber Fined By Regulators In Britain & The Netherlands

Avoidable data security flaws allowed the personal details of around 2.7 million UK customers to be accessed and downloaded by attackers.

2018-11-30

Barclays Fights Off Cyber-Attacks Daily

Barclays Bank fights off attacks from cyber criminals every single day, according to the head of the bank’s cyber security operations centre.

2018-11-28

British Parliament Seizes Facebook Documents

Rarely used parliamentary powers have been used to demand that a US software firm hand over secret data and Facebook say they want it back.

2018-11-29

Cyber Attacks On Australia Reveal A Pattern

Skip R&D, go straight for the IP: China is breaking an agreement with Australia not to steal each other's commercial secrets.

2018-11-29

From Machine Learning To Machine Reasoning

AI doesn’t fit the technology adoption lifecycle pattern. Rather it’s a quest… a quest for the intelligent machine.

2018-11-27

Russian Hackers Have New Weapons

Call them by their names: Fancy Bear, Cozy Bear, APT28 and Sofacy. They are all launching fresh attacks and one is on a mini-espionage campaign.

2018-11-27

Russian Cyber Strategy And Tactics

Russia views cyber very differently to its western counterparts, from how they define cyberwarfare to how they employ cyber capabilities.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DXC Technology

DXC Technology

DXC Technology helps global companies run their mission critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability.

Ataya & Partners

Ataya & Partners

Ataya & Partners is a consulting company that delivers data protection, cybersecurity and IT & Digital governance services.

ShiftLeft

ShiftLeft

ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle.

National Initiative for Cybersecurity Education (NICE) - USA

National Initiative for Cybersecurity Education (NICE) - USA

NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

Arkose Labs

Arkose Labs

Arkose Labs' Fraud and Abuse Platform combines Telemetry and adaptive Enforcement Challenges to break down the ROI of fraudsters and protect digital businesses.

BLOCKO

BLOCKO

BLOCKO is a blockchain specialized technology company that has experienced and achieved the largest amount of business in South Korea.

Macquarie Telecom Group

Macquarie Telecom Group

Macquarie Telecom is Australia's datacentre, cloud, cyber security and telecom company for mid-large business and government customers.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

GLIMPS

GLIMPS

GLIMPS-Malware automatically detects malware affecting standard computer systems, manufacturing systems, IOT or automotive domains.

HCS

HCS

HCS is an IT Company and Telecoms provider with an experienced team who are dedicated to ensuring our clients business systems are protected.

Sidcon International Consulting Company

Sidcon International Consulting Company

SIDCON International Consulting Company has been providing consulting services since 2002 for private and public organizations in Ukraine and other countries.

Stack Identity

Stack Identity

Stack Identity protects access to cloud data by prioritizing identity and access vulnerabilities via a live data attack map.

Aquia

Aquia

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges.

IDVerse

IDVerse

IDVerse is focused on making user verification effortless through technology. We build intelligent tools that protect users from identity fraud while enabling a seamless user experience.

Interlock

Interlock

Interlock are building blockchain-based security products that solve legacy web2 security issues - phishing and social engineering.