FREE TO VIEW


« Back to News

2018-05-31

Quantum Computing - What You Should Know

As conventional computing technology matures and with an insatiable demand for more power, there is a growing interest in quantum computing.

2018-06-01

Countering Electoral Interference

Russia’s campaign targeting the 2016 US election shows the how deeply democratic processes can be undermined using communications technology.

2018-05-31

FBI Seizes Control Of Russian Botnet

FBI agents have seized control of a key server in the Kremlin’s global botnet of 500,000 hacked routers, allowing the victims to be identified.

2018-05-30

GDPR - More People Will Share Data

One effect of GDPR will be to increase consumer confidence, making users more likely to share personal data with organisations they trust.

2018-05-30

Denmark Under Attack

Two out of three businesses surveyed have been on the receiving end of cyber-attacks in the last year, with one in eight of those attacks successful.

2018-05-30

A Cyber Attack Could Cripple The UK

The chief of British military intelligence makes a rare public statement warning of the UK's vulnerability to a major cyber attack.

2018-05-30

Mexican Bank Hack Led To A Cash Flight

Several Mexican banks have experienced large cash withdrawals after possible cyber attackers infiltrated the central bank payments system.

2018-05-29

Is The US Heading Toward A Cashless Economy Via Blockchain?

The banking industry is starting to believe it's only a matter of time before central banks adopt a form of digital currency that looks like Bitcoin.

2018-05-29

Business Cyber Security Strategy

The Corporate Board is ultimately accountable for the protection of corporate systems and they need to develop a robust cyber security policy. (£)

2018-05-29

Europe Is A Cybercrime Hub

Europe needs businesses to invest in innovative, real-time security capabilities that are robust enough to withstand intense attacks.

2018-05-29

Ecuador Spied On Assange

Trust: Whilst taking refuge in the London Embassy, Assange hacked his hosts network secrets, even although they had him under covert surveillance.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IGEL Technology

IGEL Technology

IGEL Technology is one of the world's leading thin client vendors. Thin clients increase data security and compliance.

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

Mobile Mentor

Mobile Mentor

Mobile Mentor is an independent provider of enterprise mobility solutions in New Zealand and Australia.

BetterCloud

BetterCloud

BetterCloud puts IT in control of the modern workplace through user lifecycle management, data discovery, and IT and security automation purpose-built for SaaS.

High Sec Labs (HSL)

High Sec Labs (HSL)

High Sec Labs develops high-quality, cyber-defense solutions in the field of network and peripheral isolation.

4Stop

4Stop

4Stop is a global KYC, compliance and anti-fraud risk management company.

ISA Security Compliance Institute (ISCI)

ISA Security Compliance Institute (ISCI)

ISCI, a not-for-profit automation controls industry consortium, manages the ISASecure™ conformance certification program for industrial automation and control systems.

e360

e360

e360 (formerly Entisys360) is an award-winning IT consultancy specializing in advanced IT infrastructure, virtualization, security, automation and cloud first solutions.

SIRP Labs

SIRP Labs

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response.

Wayra

Wayra

Wayra connects Telefónica and technological disruptors around the world. As their preferred strategic partner, we scale them up to accelerate their business and ours.

OSIbeyond

OSIbeyond

OSIbeyond provides comprehensive Managed IT Services to organizations in the Washington D.C., MD, and VA area including IT Help Desk Support, Cloud Solutions, Cybersecurity, and Technology Strategy.

Global Cybersecurity Association (GCA)

Global Cybersecurity Association (GCA)

GCA’s Symposium and conferences featuring global thought leaders and CISOs provide a global best practice perspective on cybersecurity.

Shield Capital

Shield Capital

Shield Capital helps founders build frontier solutions in cybersecurity, artificial intelligence, space & autonomy for commercial and government enterprises.

Dawgen Global

Dawgen Global

Dawgen Global is an integrated multidisciplinary professional service firm in the Caribbean Region providing a range of services including Risk Management and Information Systems Assurance.

Trustifi

Trustifi

Trustifi leads the market with the easiest to use and deploy email security products, providing both inbound and outbound email security from a single vendor.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.