FREE TO VIEW


« Back to News

2017-05-24

What We Know About The WannaCry Cyberattack So Far

The attack has served as a live demonstration of a new type of global threat, one that could encourage future hackers.

2017-05-23

Trump Signs Cybersecurity Order

Three Components: Protecting federal networks, cybersecurity of critical infrastructure and promoting cyber-security workforce development.

2017-05-25

Cyber Crime Drives Up The Cost Of Insurance

Insurers see coverage against hackers as one of their most promising markets, estimating that premiums will triple over the next four years.

2017-05-24

Industrial Robots Are A Security Weak Link

Web-connected industrial robots used in factories and logistics are insecure, leaving companies wide open to cyber attacks & costly damages.

2017-05-23

Data Breaches & The Internet of Things

The IoT opens up new pathways for hackers. Are new laws needed to protect consumers and to govern disclosure of data breaches?

2017-05-23

US Reduces Crime Rates Using Effective IT

Crime has fallen dramatically over the past 20 years, primarily due to the technological changes which have made it harder to commit crime.

2017-05-22

WannaCry Attack Is A Big Wake-Up Call

The ransomware attack highlights a dependence on interconnected technology & the massive challenge to secure the software systems we rely on.

2017-05-22

Hackers Came, But the French Were Prepared

President Macron's campaign team thwarted Russian hackers, showing a level of ingenuity missing in Hillary Clinton’s failed presidential campaign.

2017-05-16

What Every CISO Needs To Know

Enterprises are under an endless stream of cyber attacks. The sophistication of these attacks is evolving and prioritization is essential.

2017-05-16

Microsoft, Kaspersky & Symnantec Weigh In On WannaCry Ransomware

Top security firms have found evidence linking the WannaCry ransomware to the prolific North Korean Cybergang known as Lazarus Group.

2017-05-17

Systemic Cyber Attacks Most Likely In Finance & Energy Industries

Experts at insurance giant AIG have identified the industry sectors at highest risk to systemic threats.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

D-RisQ

D-RisQ

D-RisQ is focussed on delivering techniques to reduce the development costs of complex systems and software whilst maximising compliance

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

CLUSIF

CLUSIF

Clusif is the reference association for digital security in France. Its mission is to promote the exchange of ideas and feedback through working groups, conferences and publications.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

Networkers

Networkers

Networkers is a global recruitment consultancy helping unite job-seekers and hiring companies across the technology industry.

Flexera

Flexera

Flexera is reimagining the way software is bought, sold, managed and secured.

OnSystem Logic

OnSystem Logic

OnSystem Logic has developed a unique, patent-pending solution to solve the problem of the exploitation of flaws in application software as a technique for cyber attacks.

Centro de Gestion de Incidentes Informaticos (CGII)

Centro de Gestion de Incidentes Informaticos (CGII)

CGII is the Computer Incident Management Center of the State of Bolivia.

Senteon

Senteon

Senteon is a turnkey cybersecurity platform designed to make securing confidential data affordable, understandable, and streamlined for small-to-mid sized businesses and MSPs.

Harvey Nash

Harvey Nash

Harvey Nash is a leading global provider of talent and technology solutions.

Torch.AI

Torch.AI

Torch.AI’s Nexus™ platform changes the paradigm of data and digital workflows, forever solving core impediments caused by the ever-increasing volume and complexity of information.

Apex Systems

Apex Systems

Apex Systems is a world-class technology services business that incorporates industry insights and experience to deliver solutions that fulfill our clients’ digital visions.

Snare

Snare

Snare is a comprehensive set of event monitoring and analysis tools designed to address critical auditing and security requirements.

Prescott

Prescott

Prescott acts as your guiding light in the preparation for your CMMC assessment and long after by governing your cybersecurity practice.

Yondu

Yondu

Yondu empowers businesses across various industries through a wide array of innovative technology solutions to help them scale in the new digital economy.

AVIANET

AVIANET

AVIANET's goal is to empower enterprises and corporations worldwide and manage their digital transformation journey with confidence.