FREE TO VIEW


« Back to News

2018-06-07

Chinese & Russian Hackers Target S. Korea Ahead Of US / N. Korea Summit

Whilst S Korea has long been a target of it's northern neighbour, the experts at FireEye say the pace of attacks from elsewhere is intensifying.

2018-06-07

‘Important Information About Your Credit Card’

No, it is not from your credit card company. It is a phishing email sent to you by criminals designed to steal your credit card numbers and identity.

2018-06-07

Facebook Gave Chinese Tech Firms Access To User Data

Facebook shares its user data with several Chinese tech firms, including Huawei and Lenovo, both suspected as risks to US national security.

2018-06-06

UK Will Name The Nations Sponsoring Cyber Attacks

Britain will name and shame foreign states that hire hackers to carry out cyber attacks or interfere via the Internet in national elections.

2018-06-06

Cybercrime Is Increasing In Scotland

Sexual offenses, phishing and other online fraud are on the increase in Scotland, although the national police force say they are adapting to change.

2018-06-06

Bank of England CIO Sets A Cybersecurity Challenge

Driven by a nationwide skills gap, the Bank of England is hosting its first face-to-face cyber security competition to find young talent.

2018-06-04

Police Are Mishandling Digital Forensic Evidence

British MPs investigating digital disclosure problems are told a lack of both resources and expertise are leading to court cases collapsing.

2018-06-06

Terrorists Deploy New Techniques To Counter Digital Forensics

Terror groups are using new and better techniques to hide data in computers and phones to reduce the intelligence value of seized laptops & phones.

2018-06-01

Florida Universities Launch A Joint Cyber Training Platform

The Florida Center for Cybersecurity will bring its virtual learning lab, called the CyberHub, to more public universities across the state this fall.

2018-06-03

Security University CyberSecurity Registered Apprenticeship Program

Security University Announces US Department of Labor Approval of Qualified/CyberSecurity Registered Apprenticeship Program

2018-06-02

InfoWatch Launches M. East Cyberecurity Training Centre

A new Middle East-based centre will provide education and advanced training in cyber security, IoT, big data, artificial intelligence and blockchain.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CloudEndure

CloudEndure

CloudEndure offers Disaster Recovery and Continuous Replication for the Cloud.

BigWeb Technologies

BigWeb Technologies

BigWeb Technologies is dedicated to provide its clients with ICT related services including Infrastructure Solutions, Consultancy and Security.

Technology Law Alliance (TLA)

Technology Law Alliance (TLA)

Technology Law Alliance is a specialist IT law firm focussed on the fields of technology, outsourcing and e-commerce.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

Dataprise

Dataprise

Dataprise is a leading IT managed services provider offering IT Management and Help Desk Support Services, Cloud Services, Information Security Solution, IT Strategy and Consulting.

R-Tech

R-Tech

R-Tech GmbH manages the digital start-up initiative, whose goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

Plante Moran

Plante Moran

Plante Moran is a leading audit, tax, consulting, and wealth management firm. Areas of consulting expertise include cybersecurity.

Telit Cinterion

Telit Cinterion

Telit Cinterion is a global enabler of the intelligent edge providing highly secure IoT solutions, modules and services.

Evervault

Evervault

Evervault provides engineers easy solutions to complex data security and compliance problems.

GO Business

GO Business

GO Business are a specialised B2B team within GO that caters to the communication needs of the local business community in Malta.

Bureau

Bureau

Bureau is a no-code, identity decisioning platform that offers businesses the complete range of risk, compliance and ongoing fraud monitoring solutions innovated with AI.

CertX

CertX

CertX is a Swiss functional safety, cybersecurity and artificial intelligence certification body.

ThreatMon

ThreatMon

Gain insights into emerging threats with real-time data and AI-driven analysis to stay ahead of cyber risks. Detect, analyze, and respond to threats before they happen.