FREE TO VIEW


« Back to News

2018-08-30

World’s Top 20 Cybersecurity Companies

The experts at Pagan Research have ranked the top 20 in the Cybersecurity 500 leading cybersecurity companies.

2018-08-28

Nobody Is Talking About The  Age of Cyberwar

There is little debate about using cyber weapons, perhaps because these weapons remain invisible, the attacks deniable and the results uncertain.

2018-08-28

Blockchain Enables Anarchy

As soon as you distribute information on multiple servers, some of which are under other people’s control, you lose a measure of control.

2018-08-24

Facebook & Instagram Now Show How Long You Use Them

Giving users a raw count of the minutes they’ve spent in their apps plus their average usage is a good start to making users more mindful.

2018-08-23

Cyber Audits Can Save Businesses $1.5m

IBM say that systematic monitoring, logging, and auditing procedures can cut the average cost of each security breach by more than $1 million.

2018-08-24

The Market For Cybercrime Tools Is Thriving

A Dark Web survey shows cyber criminals no longer need deep technical knowledge - any type of attack is now feasible given sufficient funding.

2018-08-03

Germany Wants A Legal Framework For Cyberwar

In response to domestic intelligence reports of surging nation-state attacks against it, Germany wants to actively respond to acts of cyberwar.

2018-08-23

An Election Interference Alert System

An early warning system being developed to spot attempts to subvert elections by searching out fake news & propaganda would be easily thwarted.

2018-08-22

Blockchain In Plain English

What is Blockchain really all about? In an attempt to make this definition as simple as possible, Blockchain automates trust.

2018-08-22

Cybersecurity Jumps Up The Corporate Agenda

Security experts are more worried about data breaches than ever, with most fearing Meltdown-Spectre type attacks will become the new normal.

2018-08-21

Phishing Tools Used To Attack The Power Grid

Russian hackers penetrated hundreds of US utilities, manufacturing plants gained access by using the most conventional of phishing tools.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Qualys

Qualys

Qualys is a pioneer and leading provider of cloud security and compliance solutions.

Softtek

Softtek

Softtek helps its clients to gain a competitive edge by implementing digital solutions that propel their business strategies.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

Block Armour

Block Armour

Block Armour is a Mumbai and Singapore based venture focused on harnessing emerging technologies to counter growing Cybersecurity challenges in bold new ways.

Protergo Cyber Security

Protergo Cyber Security

Protergo Cyber Security is the first integrated provider of cybersecurity solutions in Indonesia. We proactively protect our clients from cyber threats.

Canadian Institute for Cybersecurity (CIC)

Canadian Institute for Cybersecurity (CIC)

The Canadian Institute for Cybersecurity (CIC) is a comprehensive multidisciplinary training, research and development, and entrepreneurial unit.

The ai Corporation

The ai Corporation

The ai Enterprise Fraud Solution is an on-prem or cloud-based self-service, machine learning fraud detection and prevention tool set.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Hold Security

Hold Security

Hold Security works with companies of all sizes to provide unparalleled Threat Intelligence services that actually make a difference.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

Tuta

Tuta

Tuta (formerly Tutanota) is an all-in-one email, calendar and contacts app which protects your data with full end-to-end encryption and it requires zero personal information.

Tidal Cyber

Tidal Cyber

We formed Tidal for one simple reason—we believe that defenders need and deserve tools and services that make achieving the benefits of threat-informed defense practical and sustainable.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.

Tyto Athene

Tyto Athene

At Tyto Athene, we harness the power of technology to provide solutions that shape the future.

Dev Information Technology (DEV IT)

Dev Information Technology (DEV IT)

DEV IT is a leading IT solutions and services company. We deliver digital transformation and end-to-end IT services, from advisory to execution.