FREE TO VIEW


« Back to News

2018-03-19

Millions Of Facebook Profiles Were ‘Harvested’ In US Election Breach

50m Facebook profiles were collected and analysed for the Trump campaign by Cambridge Analytica in a huge data breach.

2018-03-19

The Growing Threat Of Russian Cyber Reprisals On Britain

UK Banks, energy & water companies are on maximum alert over the threat of a serious cyber attack from Russia following an assassination attempt.

2018-03-16

North Korea's Cyber Soldiers Are Concealed Abroad

Defectors from N Korea reveal the nation's hackers are in fact mostly based outside the country to give the regime enhanced deniability.

2018-03-16

UK Police Introduce Cyber Security Certification

Introducing the UK’s first police-backed cyber security certification scheme, a two stage process based on Cyber Essentials, to avoid online threats.

2018-03-16

Dutch Intelligence Agency Pinpoints Cyberattacks

The AIVD reports that attempts at digital espionage and online political manipulation in the EU are on the rise both in number & in complexity.

2018-03-16

Blockchain: What Business Executives Need To Know

Everyone serious about business and enterprise should have at least a basic understanding of how blockchain technology works and what it can do.

2018-03-15

Gina Haspel Is Appointed CIA Director

New CIA Director Gina Haspel is a real spook and a woman with a past in 'Black Ops' who ran agents, oversaw torture & destroyed the evidence.

2018-03-14

A Cyberattack Is The #1 Risk For Business

Businesses and the public sector must now push through effective cyber security initiatives to help mitigate this looming threat of cybercriminals.

2018-03-15

Russia Warns UK Against Cyber Retaliation

Britain could launch a cyber attack in retaliation for the alleged use of a nerve agent in an assassination attempt on Russians in the UK.

2018-03-13

Singapore Sets Up A Cybersecurity Start-Up Hub

Singapore is setting up its first cybersecurity start-up incubation hub, as the nation strives to carve out a role in the digital economy.

2018-03-13

The Pentagon Puts Google’s AI To Use

Open source AI technology originally developed by Google is finding its way into big budget US military programs.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Portnox

Portnox

In 2007, Portnox set out to create one of the world’s easiest to use, most loved, value-driven network security solutions — and our customers will tell you we’ve succeeded.

Comiq

Comiq

Comiq provide software quality assurance, testing and project management services. Areas of expertise include cybersecurity.

Radiflow

Radiflow

Radiflow is a leading provider of cyber security solutions for critical infrastructure networks (i.e. SCADA), such as power utilities, oil & gas, water and others.

Avansic

Avansic

Avansic is a leading provider of e-discovery and digital forensics services to attorneys, litigation support teams, and business communities.

CYQUEO

CYQUEO

CYQUEO is your professional partner and system integrator. We secure your organization against advanced cyber threats.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

Knowledge Transfer Network (KTN)

Knowledge Transfer Network (KTN)

KTN links new ideas and opportunities with expertise, markets and finance through our network of businesses, universities, funders and investors.

DataExpert Singapore

DataExpert Singapore

DataExpert Singapore provide solutions and services in the areas of Digital Forensics, Data Recovery, Data Duplication, Data Degaussing & Wiping, Data Destruction, and IT Disposal.

Retruster

Retruster

Protect your users against phishing emails, ransomware & fraud with the most advanced, user-friendly, non-intrusive solution available.

WheelHouse IT

WheelHouse IT

WheelHouse IT secures, manages, and advances businesses with innovative, cost-effective IT solutions.

Normalyze

Normalyze

Normalyze are solving some of the most painful problems enterprise IT security teams face in the cloud and data security space. We help enterprises protect all the data they run in the cloud.

Scybers

Scybers

Scybers are a global cybersecurity advisory and managed services company. With our deep expertise, we help our clients reduce their cyber risks with confidence.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

AI Security Institute (AISI)

AI Security Institute (AISI)

The AI Security Institute’s mission is to minimise surprise to the UK and humanity from rapid and unexpected advances in AI.

Norwegian Data Protection Authority (Datatilsynet)

Norwegian Data Protection Authority (Datatilsynet)

The Norwegian Data Protection Authority (Datatilsynet) is the national data protection authority for Norway.

FSP

FSP

FSP is a leading consultancy specialising in Digital, Security and AI solutions. We navigate the complexities of data sensitivity, confidentiality, governance and compliance.