FREE TO VIEW


« Back to News

2018-11-19

Cybersecurity Vigilance Is Mandatory

Mobile Devices, Cryptojacking, Botnets and Encrypted Traffic are four key vulnerabilities that security leaders should be focusing on right now.

2018-11-19

South Korea To Triple Investment In Blockchain

The S Korean government will invest $35 million next year’s to develop blockchain technology & related distributed ledger technology.

2018-11-21

Journalists Aim To Detect Deepfakes

Across the media industry, news organisations can consider multiple approaches to help authenticate news stories if they suspect alterations.

2018-11-20

AI For Cyber - You Don’t Need To Know The Threat, Just The Network

AI driven cybersecurity does its work not by hunting viruses but by understanding networks.

2018-11-19

Delay, Deny and Deflect: How Facebook’s Leaders Fought Through Crisis

A bombshell report on Facebook management’s struggles to deal with data breaches, failures to protect privacy and electoral interference.

2018-11-19

Japanese Cybersecurity Minister Does Not Use Computers

The Japanese Government minister in charge of major changes to a key cybersecurity law has admitted he rarely uses a computer.

2018-11-19

AI Is Revolutionising Digital Marketing

With the ability to collect data, analyse it, apply it and then learn from it. ArtificiaI Intelligence is transforming digital strategy for business.

2018-11-22

What Is The GRU & Who Does It Hack?

The GRU is Russia’s Main Intelligence Directorate and officially it doesn’t exist, but its agents are very busy. Who are they and what do they do?

2018-11-16

The Search To Find Cyber Security Experts Of The Future

An online programme designed to inspire teenagers in the UK to think about a career in cyber security will continue for a second year.

2018-11-16

GDPR Alert As Average ICO Fines Double In A Year

The value of fines issued by the British Information Commissioner’s Office (ICO) has increased 24% in the past year.

2018-11-16

China Exports Cyber Surveillance To Africa

China is ramping up exports of facial recognition technology and online surveillance techniques abroad, especially in Africa.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

GovCERT.CZ

GovCERT.CZ

GovCERT.CZ is the Government Computer Emergency Response Team of the Czech Republic.

OpenSphere

OpenSphere

OpenSphere is an IT company providing security consultancy, information system risk management and security management services.

CERT-PA

CERT-PA

CERT-PA is the national Computer Emergency Response Team for Italian government institutions.

PakCERT

PakCERT

PakCERT is the national Computer Emergency Response Team for Pakistan.

UL Solutions

UL Solutions

UL Solutions is a safety, security and compliance consulting and certification company. Areas covered include cyber security.

NXO France

NXO France

NXO is an independent leader in the integration and management of digital workflows with services covering digital infrastructures, communications & collaboration, and security.

Workz Group

Workz Group

Workz connects and protects mobile subscribers of today and tomorrow by providing secure removable or embedded SIMs and remote provisioning solutions for consumer, M2M and IOT devices.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

Asset Guardian Solutions (AGSL)

Asset Guardian Solutions (AGSL)

Asset Guardian are dedicated to protecting the integrity of process control systems software that is used to control operations and production processes.

KT Secure

KT Secure

KTSecure’s mission is to provide proven and productive cyber security solutions and managed services, backed by our highly qualified and passionate team of experts.

Single Point of Contact

Single Point of Contact

Single Point of Contact is a Managed IT Services provider that helps businesses to achieve a seamless and secure IT environment.

c0c0n

c0c0n

c0c0n is the longest running conferences in the area of Information Security and Hacking, in India.

Staley Technologies

Staley Technologies

Staley Technologies is a US nationwide structured cabling, technology integrator, and Managed IT & Cyber Security provider.

NVISO Security

NVISO Security

NVISO is a pure-play cyber security consulting firm, focused mainly on the Financial Sector, the Technology Sector, and Government & Critical Infrastructure.

CIP Cyber

CIP Cyber

CIP Cyber is an online learning community with a mission of connecting, training, and certifying cybersecurity professionals to protect critical infrastructure.

Realm.Security

Realm.Security

Realm.Security is pioneering the creation of an easy-to-implement, simple-to-use security fabric solution that is purpose-built for cybersecurity.