FREE TO VIEW


« Back to News

2018-02-26

Discover Hidden Cybersecurity Talent

People who are not IT professionals can make valuable, diverse contributions to a cyber defense program.

2018-02-26

What’s Happening With China’s Fintech?

A unique technology ecosystem: A tech-savvy population, an underdeveloped banking industry, and an initially relaxed regulatory environment.

2018-02-26

Fake News: Could A Cyberattack Cause A Cyberwar?

Fake news is actually a form of cyberattack. When people believe everything they read on social media, the world becomes an unpredictable place.

2018-02-27

Your Questions Answered By The GDPR Advisory Board

The big GDPR questions answered by the professional experts at the GDPR Advisory Board, Dr Alfred Rolington and Piers Clayden.

2018-02-26

FBI, CIA & NSA Officials Agree: Stay Away From Huawei Phones

Without disclosing hard evidence, the US intelligence establishment are united in accusing the Chinese telecoms giant of cyber espionage.

2018-02-23

Cybersecurity Is A Job for CEOs, Not Just The IT Team

Cyber attacks on business pose real dangers to the bottom line and corporate reputation. They must be dealt with first-hand in the boardroom.

2018-02-23

Police Prepare for Cyber Attacks

Canada is heightening its cybersecuity defenses across the board, not least in its regional police forces.

2018-03-02

Delve Into GDPR - Questions & Answers

A team of GDPR experts giving straightforward advice and help for those with queries about this critical new legislation.

2018-02-22

Cyber Threats Will Grow With GDPR

The cyber threat landscape will only get worse under GDPR and it could be cheaper to pay ransom and stay silent than pay the fines.

2018-02-22

AI Will Underpin Cybersecurity

Cybersecurity risks are growing in complexity and volume, but artificial intelligence techniques can help businesses fight them in real time.

2018-02-21

Tackling The Insider Threat: … Where To Start?

Many organisations still believe the insider threat is limited to a rogue employee, but insider threats don't have to be malicious.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Information Security Research Association (ISRA)

Information Security Research Association (ISRA)

ISRA is a non-profit organization focused on various aspects of Information Security including security research and cyber security awareness activities.

Paramount Computer Systems

Paramount Computer Systems

Paramount is a regional leader in the Middle East for cybersecurity solutions and consulting services.

Cyber8Lab

Cyber8Lab

Cyber8Lab provides cybersecurity training programmes simulating real world cybersecurity incidents such as web defacement, malware, phishing, digital forensics analysis and wireless intrusion.

Arete

Arete

Arete is a global cyber risk company whose mission is to transform the way organizations prepare for, respond to, and prevent cybercrime.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

Open Connectivity Foundation (OCF)

Open Connectivity Foundation (OCF)

OCF is dedicated to ensuring secure interoperability ensuring secure interoperability of IoT for consumers, businesses and industries.

iHLS Startups Accelerator

iHLS Startups Accelerator

iHLS Accelerator is the first startup accelerator in the world in the security and homeland security field.

Carve Systems

Carve Systems

Carve Systems was founded to bring enterprise level information security, training, and risk management services to organizations of any size and industry.

Pyxsoft PowerWAF

Pyxsoft PowerWAF

Pyxsoft PowerWAF responds to the problem of business cybersecurity. We protect our clients' websites and data against attacks and exploitation of all kinds of vulnerabilities.

Switchfast Technologies

Switchfast Technologies

Switchfast Technologies is an IT consulting and managed services provider, offering IT support and consulting to Chicagoland small businesses.

OwnBackup

OwnBackup

OwnBackup proactively prevents you from losing mission-critical data and metadata with automated backups and rapid, stress-free recovery.

Computer Services Inc (CSI)

Computer Services Inc (CSI)

CSI is a leading fintech, regtech and cybersecurity solutions partner operating at the intersection of innovation and service.

Coretelligent

Coretelligent

Coretelligent is a leading providers of Managed and Co-Managed IT, cybersecurity and private cloud services.

Winmill Software

Winmill Software

Winmill is a technology services company that provides expert consulting services in Application Development, Application Security and Cyber Security.

Cyber Security Council UAE

Cyber Security Council UAE

The Cyber Security Council's vision is to protect UAE cyberspace, maintain confidence in our digital infrastructure and institutions, and build a cyber-resilient society.

PRE Security

PRE Security

PRE Security is leading the transition into the next era of AI cybersecurity with a new model: Predict & Prevent.