FREE TO VIEW


« Back to News

2018-08-06

GDPR Survey Shows 80% Non-Compliance

Only 20% of companies surveyed believe they are GDPR compliant, while 53% are in the implementation phase and 27% have not started.

2018-08-02

Five Key Ways to Protect Your Company Against Cyber Attacks

The steps to achieving business security include the use of up-to-date data encryption, data back-up, firewalls, anti-malware software and insurance.

2018-07-25

Singapore’s Giant Healthcare Hack

Hackers attacked the computers of SingHealth, the Republic's largest public healthcare group and scooped up personal information on 1.5m patients.

2018-08-02

MoneyTaker Take Money From A Russian Bank

The MoneyTaker group are hard to track because they use common OS utilities to perform malicious actions, instead of relying on actual malware.

2018-07-25

Trump / Putin Summit Was A Magnet For Hackers

The Helsinki meeting between Presidents Trump and Putin was as big a magnet for hackers as the Singapore summit with Kim Jong-un.

2018-08-02

What A ‘Cyber 9/11’ Would Look Like

Experts think national cyber vulnerabilities stem in large part from a lack of qualified people capable of defending companies and governments.

2018-07-24

Fraudsters £350k Spoof University Emails

Action Fraud issue a warning as reports show that fraudsters are registering domain names to look like they belong to UK university email addresses.

2018-07-24

Mitigating IoT Cyber Risks: Training Is The First Step

It is vital to educate everyone in the risks involved with adopting increased IoT connectivity and how it can be mitigated.

2018-07-23

Darktrace - From Cybersecurity Start-Up To Unicorn

Darktrace has been named Europe's most promising tech company with a $1.25 billion valuation and contracts secured worth $400m.

2018-07-23

No More Asylum For Julian Assange

Ecuador is planning to withdraw its political asylum for Assange, eject him from its London embassy & might turn him over to the British authorities.

2018-07-21

Trump Blames Obama For Russian Cyber-Attack

US President Donald Trump has blamed Barack Obama for failing to prevent Russia’s 2016 cyber-attack on democratic email servers.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Advent IM

Advent IM

Advent IM is one of the UK’s leading independent cyber security specialists, with a unique approach to providing holistic security management solutions.

CipherPoint Software

CipherPoint Software

CipherPoint Software provides data-centric auditing and protection solutions for securing unstructured information

MetaFlows

MetaFlows

MetaFlows’ SaaS malware detection & prevention software passively analyzes the behavior and the content of Internet traffic.

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality ISAC operates as a central hub for sharing sector-specific cyber security information and intelligence.

Blockchain Solutions

Blockchain Solutions

Blockchain Solutions Limited is a technological One Stop Solution provider, for Blockchain technology.

Liquid Intelligent Technologies

Liquid Intelligent Technologies

Liquid Intelligent Technologies is a leading communications solutions provider across Africa, providing reliable connectivity, hosting, co-location, and digital services including cyber security.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

Telstra

Telstra

Telstra is one of the world's leading telecommunications and technology companies, offering a wider range of services from networks and cloud solutions to mobility and enterprise collaboration tools.

RecoLabs (Reco)

RecoLabs (Reco)

Reco empowers organizations to discover their SaaS applications, identities, and data, control access and prevent the risk of exposure.

Wadilona Cyber Securities

Wadilona Cyber Securities

Wadilona Cyber Securities' sole aim is to bring and secure Information and Communications Technology (ICT) to and work for humans in its simplest terms.

Telesystem

Telesystem

Telesystem empowers businesses across the USA with a range of innovative network, communication and collaboration solutions.

EtherAuthority

EtherAuthority

EtherAuthority's engineering team has been helping blockchain businesses to secure their smart contract based assets since 2018.

Cyber Risk International

Cyber Risk International

Cyber Risk International offer CyberPrism, a B2B SaaS solution that empowers businesses to perform a self-assessment of their cyber security program.

QPoint Technologies

QPoint Technologies

QPoint provides solutions and consulting in areas including software engineering, testing, cybersecurity, ICT, web, mobile, project management, and complex integration processes.

Reclaim Security

Reclaim Security

Reclaim Security is your always-on force multiplier, empowering security teams to eliminate threat exposure using your existing security stack.