FREE TO VIEW


« Back to News

2017-07-18

Cybersecurity: The Cold War Online

The Internet is under attack, and not just by hackers, thieves and spies. Cyber-space is becoming a war zone in a new era of ideological combat.

2017-07-17

Terrorist Activities On Social Media

The financial services sector is required to report suspicious transactions. Should the same apply to suspicious communications on social media?

2017-07-17

Cyber Caliphate's Scorecard

The Cyber Caliphate is really good at social media & communications but is still learning when it comes to cyber-attack expertise.

2017-07-17

US Marines Embrace Cyber Warfare

In the Halls of Montezuma: Collecting enemy cellphones, gathering forensic intelligence, flying surveillance drones, electromagnetic disruption.

2017-07-17

WikiLeaks Reveal CIA Credentials Malware

Both WannaCry and Petya ransomware attack waves are thought to originate in stolen NSA exploits. Wikileaks reveals there are many more.

2017-07-14

Biometric Products Can Help Cybersecurity

65 percent of large firms in the UK detected a cybersecurity breach or attack in the past year. Adding biometrics to cybersecurity could fix that.

2017-07-14

Who Is Behind Petya?

Petya has several different names, but the experts at ESET say the origins of this destructive ransomware lie in one direction.

2017-07-13

Are Corporate Cyber Defenses Adequate?

It’s not just about the technology: Business leaders should be focusing on their companies’ systemic risks, rather than just software.

2017-07-13

AI For Effective Healthcare Cyber Resilience

Healthcare CISOs should recognise that AI has the ability to enhance the identification of malicious activity and to protect systems and data from attackers.

2017-07-13

Hackers Attempt To Penetrate US Nuclear Plants

The US government is warning industrial firms about hacking activity targeting the nuclear and energy sectors.

2017-07-13

Twitter May Introduce A 'Fake News' Flag

A new feature that would let users flag tweets that are false or inaccurate, in an attempt to combat the spread of disinformation on the platform.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Security Mentor

Security Mentor

Security Mentor provides innovative, online security awareness training designed for how people learn and work.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

K7 Computing

K7 Computing

K7 provides antivirus and internet security products for business and home users.

Orange Cyberdefense

Orange Cyberdefense

Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group, providing managed security, managed threat detection & response services to organizations around the globe.

Alliance for Cyber Security (ACS)

Alliance for Cyber Security (ACS)

An alliance of all major players in the field of cyber security in Germany with a mission to strengthen Germany’s resistance to cyber-attacks.

Invensis Learning

Invensis Learning

Invensis Learning is a professional training and certification company providing IT Service Management, IT Security & Governance, DevOps, Cloud Computing and Digital Awareness training.

Viscount Systems

Viscount Systems

Viscount Systems is a global security software solutions company that is changing the way access control is deployed and managed in the enterprise.

Corelight

Corelight

Corelight is the most powerful network visibility solution for information security professionals.

Verificient Technologies

Verificient Technologies

Verificient Technologies specializes in biometrics, computer vision, and machine learning to deliver world-class solutions in continuous identity verification and remote monitoring.

RiskXchange

RiskXchange

RiskXchange's cybersecurity risk rating solution helps businesses solve complex cybersecurity and compliance challenges by providing a 360-degree view of your cybersecurity posture.

Hexaware Technologies

Hexaware Technologies

Hexaware is an automation-led next-generation service provider delivering excellence in IT, BPO and Consulting services.

Pentesec

Pentesec

Pentesec is a security specialist offering professional services, managed security services and expertise within an extensive range of security technologies.

BreachQuest

BreachQuest

BreachQuest brings together cybersecurity experts with decades of experience identifying security flaws, penetrating networks, and responding to incidents.

DoQubiz Technology

DoQubiz Technology

DoQubiz is using the idea of security through obscurity to develop their proprietary Fractal Security Engine that implements a highly resilient data protection protocol.

Invicti Security

Invicti Security

Invicti Security is an AppSec leader transforming the way web applications are secured.

Relyance AI

Relyance AI

Relyance AI - One unified platform for privacy, security, & governance.