FREE TO VIEW


« Back to News

2018-06-05

Ridge Global Cybersecurity Institute launched

Ex - US Homeland Security Chief launches of the Ridge Global Cybersecurity Institute, a go-to source for all cybersecurity related services.

2018-06-05

Cybercrime: Law Enforcement Must Get Serious

A crime is crime, whether the bad actor is throwing a brick or wielding a keypad. Police should treat online crimes and physical crimes the same.

2018-06-05

Playing Catch-Up With GDPR

Beyond the EU the GDPR regulation is expected to reshape how global organisations manage, share and protect their users’ personal data.

2018-06-05

Demand For Indian Cybersecurity Skills Rising Fast

A side effect of GDPR is to promote a surge in demand for cybersecurity skills in outsourced IT centres in India.

2018-06-04

Malta Under Large Scale Attack

As a well known offshore banking centre for Russian nationals, it is perhaps no surprise that Malta suffers a high number of cyber attacks.

2018-06-04

Action Fraud Reports A Sharp Rise In Fake TSB Activity

The UK online crime reporting service is seeing a big jump in suspicious messaging connected with the stricken customer IT systems of TSB Bank.

2018-06-04

Nation State Cyber Attacks Are An Act Of War

Top British law officer thinks hostile states targeting essential infrastructure & services should be treated in the same way as physical attackers.

2018-06-04

GDPR Is Now Effective

GDPR is a wake-up call for American companies to solidify best practices around their big data and data science initiatives.

2018-06-04

Japan’s Secret Spy Agency

Like any other advanced economic power, Japan operates a significant intelligence and surveillance apparatus. Here is an outline.

2018-06-01

N Korean Cyber Attacks Continue Despite Peace Talks

Experts see an intensification in the level of cyber attacks from N Korea in the build up to talks with S Korea and the US on de-nuclearisation.

2018-05-31

Quantum Computing - What You Should Know

As conventional computing technology matures and with an insatiable demand for more power, there is a growing interest in quantum computing.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Malware.lu

Malware.lu

Malware.lu is a repository of malware and technical analysis. The goal of the project is to provide samples and technical analysis to security researchers.

SecureMetric Technology

SecureMetric Technology

SecureMetric is one of SE Asia’s leading players in the field of digital security with a focus on Software Licensing Protection, 2-Factor Authentication, Advanced Identity and Access Management, Publi

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Balbix

Balbix

Balbix BreachControl™ is the industry’s first system to leverage specialized AI to provide comprehensive and continuous predictive assessment of breach risk.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

TwoThreeFour

TwoThreeFour

ThreeTwoFour provide tailored cyber security solutions, delivered by highly-skilled, experienced consultants who respond to the real needs of you and your business.

In-Q-Tel (IQT)

In-Q-Tel (IQT)

IQT is the non-profit strategic investor that accelerates the development and delivery of cutting-edge technologies to U.S. government agencies that keep our nation safe.

Data Protection Commission (DPC)

Data Protection Commission (DPC)

The Data Protection Commission (DPC) is the national independent authority responsible for upholding the fundamental right of individuals in the EU to have their personal data protected.

RiskSmart

RiskSmart

RiskSmart empower risk, compliance, and legal teams with a tech-led and data-driven platform designed to save time, reduce costs and add real value to businesses.

VLC Solutions

VLC Solutions

VLC Solutions is an independent solutions and technology service provider offering Cloud Services, Cybersecurity, ERP Services, Network Management Services, and Compliance Solutions.

AHAD

AHAD

AHAD provides cybersecurity, digital transformation, and risk management services and solutions to Government, Fortune 500, And Start-Up Companies in the Middle East region.

DRT Cyber

DRT Cyber

DRT Cyber deploys technology solutions to support the functions of cybersecurity, privacy, and risk management.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.

Securafy

Securafy

At Securafy, we understand how important it is to have the right IT partner by your side. For over 30 years, we’ve helped businesses stay secure, connected, and compliant.

Coana

Coana

Coana helps software teams tackle the flood of alerts from traditional SCA tools. Using advanced reachability analysis, Coana cuts false alerts by over 80%, freeing up significant engineering time.