FREE TO VIEW


« Back to News

2018-05-08

Blockchain Will Radically Transform Anti-Fraud

Blockchain's distributed ledger technology is ideal for meeting government data rules (GDPR) and serving as a trusted tool for identity verification.

2018-05-03

The Next Russian Cyberattacks Will Be More Damaging

Russia is using cyber warfare methods as part of a wider effort to attack the international system, according to the British Prime Minister.

2018-05-01

Cybersecurity Advice For SMEs

Cybersecurity threats to business originate in the 1980s but many smaller organisations still don't understand the risks to their electronic systems.

2018-04-26

Website Linked To Attacks On UK Banks Is Shut Down

DDOS For Hire: A website linked to more than 4m cyber attacks worldwide, including against some of Britain’s biggest banks, has been shut down.

2018-05-02

Cambridge Analytica Planned To Issue Digital Currency

Cambridge Analytica was planning to raise money by issuing a new type of digital currency before it became embroiled in the Facebook data scandal.

2018-04-26

Hackers Advertise Stolen Personal Data On Facebook

Criminals are using Facebook groups to advertise stolen credit card details, cyber-attacks and logins for hacked Amazon and Netflix accounts.

2018-05-01

DNA Data Storage Moves Closer To Becoming Reality

DNA might replace hard drives & other storage media and there is significant progress, including new, zero-error individual-file data retrieval.

2018-05-01

Facebook Could Save Your Life

Constant Surveillance Can Be Useful: First responders can now use a special Facebook service when conducting rescue missions.

2018-04-30

Instagram Allows Users To Download Everything Shared

Instagram will let users download their personal data, including previously shared photos, videos and messages, as it prepares for GDPR.

2018-05-08

Six Benefits From Artificial Intelligence & Machine Learning

Data is the big new strategic asset. Organisations that can effectively harness AI and Machine learning to exploit their data will be big winners.

2018-04-26

Artificial Intelligence Is Too Narrow

AI is based on sophisticated algorithms and the brute force of huge computing power. This makes it powerful, but its very specificity is a problem.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

Cipher Security

Cipher Security

Cipher Security provides unique robustness tests and penetration tests, as well as customizable development services for vendors and providers.

SISA

SISA

SISA is a global forensics-driven cybersecurity solutions company, trusted by leading organizations for securing their businesses with robust preventive and corrective cybersecurity solutions.

Software Engineering Institute (SEI)

Software Engineering Institute (SEI)

At the CERT Division of SEI we study and solve cybersecurity problems, research security vulnerabilities in software, and develop information and training to help improve cybersecurity.

Shieldfy

Shieldfy

Shieldfy is a cloud-based security shield for your website to protect it from cyber attacks and malwares.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

Emirates International Accreditation Center (EIAC)

Emirates International Accreditation Center (EIAC)

EIACI is the national accreditation body for the United Arab Emirates. The directory of members provides details of organisations offering certification services for ISO 27001.

CyberSec Hub - The Kosciuszko Institute

CyberSec Hub - The Kosciuszko Institute

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

Aurora Systems Consulting

Aurora Systems Consulting

Aurora is a Cybersecurity solutions provider with a portfolio consisting of security consulting, products and services that proactively prevent, secure and manage advanced threats and malware.

Sixteenth Air Force (Air Forces Cyber)

Sixteenth Air Force (Air Forces Cyber)

Air Forces Cyber provides mission integration of Information Warfare at operational and tactical levels, creating dilemmas for adversaries in competition and, if necessary, future conflicts.

Acmetek Global Solutions

Acmetek Global Solutions

Acmetek is a Global Distributor and a Trusted Advisor of PKI /IOT & SSL Security Products and a Managed Services Company.

Jisc

Jisc

Jisc is a membership organisation working in partnership with the UK’s research and education communities to develop the digital technologies they need to teach, discover and thrive.

Recon InfoSec

Recon InfoSec

The Recon InfoSec team includes analysts, architects, engineers, intrusion specialists, penetration testers, and operations experts.

Rimstorm

Rimstorm

Rimstorm’s mission is to significantly improve the security of your data using award-winning, state-of-the-art technology combined with cyber managed security services.

Health Sector Cybersecurity Coordination Center (HC3)

Health Sector Cybersecurity Coordination Center (HC3)

HC3 was created by the US Department of Health and Human Services to aid in the protection of vital, controlled, healthcare-related information.

Prismo Systems

Prismo Systems

Prismo provides a unified platform to secure software development across the entire SDLC and deployment on any cloud or on-premises infrastructure.