FREE TO VIEW


« Back to News

2018-01-18

Cyber Attacks Will Continue to Succeed

Spectre and Meltdown demonstrate weaknesses in current hardware cybersecurity that will force a paradigm shift within the semiconductor industry.

2018-01-23

AI Can Simplify The Purchasing Process For Business

US government workers and contractors could use AI to navigate regulations to make the federal purchasing process cheaper and less complex.

2018-01-19

Russian Troops Use Missiles & Cyber To Counter 'swarm of drones'

The Russian military says it has fought off an attack by a swarm of drones launched by jihadists against its Tartus airbase in Syria.

2018-01-22

4 Steps To Get Ready For GDPR

For organisation that do business in the EU in any capacity the General Data Protection Regulation (GDPR) is a crucial piece of legislation.

2018-01-19

FBI's Ability To Disrupt Cybercrime Has Deteriorated

FBI agents took down or disrupted only about one-tenth as many cyber-criminal operations they did three years ago.

2018-01-16

The Top 5 Tech Trends For 2018

As the technological trends keep on advancing in our digital era, 2018 is expected to be a big year for significant updates to existing products.

2018-01-16

Inside the Intel Chip Security Problem

Technology companies are still scrambling to fix serious security flaws affecting computer processors built by Intel and other chipmakers.

2018-01-15

VW and Hyundai To Offer Autonomous Cars

Self-driving taxis will be the staring point for autonomous vehicles offered by the big car companies as they link with technology partners.

2018-01-15

2018 Predictions: Full-Scale Cyber War

Cyberwar looms large as both nation states and law enforcement agencies worldwide will begin to use cyber tactics offensively in the next 12 months.

2018-01-15

Iran’s Cyber Capabilities

Offensive cyber operations have become a core tool of Iranian statecraft, gathering information against enemies at home and abroad.

2018-01-12

Iran’s Cyberwar Could Infiltrate Your Mailbox

Iran’s police crackdown on protesters could affect almost anyone who has been in contact with dissident groups, even people only distantly linked.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authenware

Authenware

AuthenWare delivers the highest level of identity security based on behavioral biometrics.

Vysk Communications

Vysk Communications

Vysk is an award-winning mobile security firm that has developed the world’s most secure system for voice communication.

DynaRisk

DynaRisk

DynaRisk helps companies protect their staff, clients and supply chain from cyber threats by enabling people to take action for themselves.

BlueFiles

BlueFiles

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing.

Salt Security

Salt Security

Salt Security protects the APIs that are the core of every SaaS, web, mobile, microservices and IoT application.

Dutch Accreditation Council (RvA)

Dutch Accreditation Council (RvA)

RvA is the national accreditation body for the Netherlands. The directory of members provides details of organisations offering certification services for ISO 27001.

Control System Cyber Security Association International (CS2AI)

Control System Cyber Security Association International (CS2AI)

CS2AI is the premier global not for profit workforce development organization supporting professionals of all levels charged with securing control systems.

Rede Nacional CSIRT

Rede Nacional CSIRT

Rede Nacional CSIRT is a national network of CSIRTs in Portugal aimed at cooperation and mutual assistance in the handling of incidents and in the sharing of good security practices.

Cognisys Group

Cognisys Group

Cognisys provides cyber security penetration testing and compliance services from its offices in Leeds and Manchester.

Eventus Security

Eventus Security

Eventus, are a team of highly skilled professionals who are committed to deliver excellence in next generation cyber security services and customized solutions for your enterprise.

Parablu

Parablu

Parablu is a leading provider of data security and resiliency solutions for the digital enterprise.

CyberXposure

CyberXposure

CyberXposure has been built by a team comprising of Cyber Security Professionals and SAAS experts in data backup, disaster recovery and cyber-security.

Foresiet

Foresiet

Foresiet is the first platform to cover all of your digital risks, allowing enterprise to focus on the core business.

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center is a state-of-the-art facility to deliver advanced cyber training programs and build the next generation of Azerbaijan’s cybersecurity professionals.

Sword Group

Sword Group

Sword is a leader in data insights, digital transformation and technology services with a substantial reputation in complex IT, business projects and mission critical operations.

A&O Shearman

A&O Shearman

A&O Shearman is a law firm at the forefront of the forces changing the current of global business: energy transition, life sciences, technology, private capital, finance and beyond.