FREE TO VIEW


« Back to News

2017-05-22

The Difference Between Cyberspace & The Internet

The two terms are sometimes used interchangeably, although they have different meanings.

2017-05-22

Cybersecurity Has A Serious Talent Shortage

Businesses should open themselves up to applicants whose non-traditional backgrounds mean they could bring challenging new ideas.

2017-05-19

EU Nations Expand Their Cyber Defences

More EU countries are working on strengthening their national security and cyber defence infrastructure.

2017-05-19

Police Innovative Reporting Technology

A new documentation and report system brings highly customised dictation and documentation capabilities to police officers on the move

2017-05-19

Major Defence Company Adopts Blockchain

Lockheed Martin is to integrate blockchain cyber security technology into systems engineering , supply chain & software development.

2017-05-18

UK Proposes Online Surveillance In Real-Time

The "live" surveillance of British web users' internet communications is proposed in a draft technical paper prepared by the UK government.

2017-05-17

Bank Data Breaches Are Up And It's An Inside Job

Bank breaches are not always due to legacy operating systems or their inability to cope with new forms of cyber attacks. There is human error.

2017-05-16

Threat Intelligence Starter Resources

Creating a threat intelligence capability can be a challenging undertaking and not all companies are ready for it.

2017-05-16

Germany May Go Offensive After Russian Cyber Attacks

German security chief wants the legal authority to "wipe out" servers the Russian government used to deploy cyber attacks against Germany.

2017-05-16

Global C4ISR Has A Cyber Warfare Surge

C4ISR refers to Command, Control, Communications, Computers, Intelligence, Surveillance & Reconnaissance. It's a growing market.

2017-05-15

The Reality is Everyone Hacks… Everyone

Kaspersky: When it comes to state-sponsored hacking, espionage and propaganda, no country should be presumed innocent.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Cigniti Technologies

Cigniti Technologies

Cigniti Technologies provides Independent Software Testing (IST) Services including software security testing.

National Information Security & Safety Authority (NISSA) - Libya

National Information Security & Safety Authority (NISSA) - Libya

NISSA is responsible for safeguarding the integrity, availability and resilienceof ICT infrastructure, resources, services and data in Libya.

CERT-UA

CERT-UA

CERT-UA is the national Computer Emergency Response Team for Ukraine.

Ethoca

Ethoca

Ethoca is a secure network for card issuers and merchants to connect and work cooperatively outside the payment network in a unique and powerful way.

LSEC

LSEC

LSEC is a global innovator and facilitator for the Cybersecurity industry. It is a non-profit membership organisation supporting further maturing the industry through its end users.

Cycuity

Cycuity

Cycuity (formerly Tortuga Logic) is a cybersecurity company that is transforming the way we secure silicon with comprehensive hardware security assurance.

Data443 Risk Mitigation

Data443 Risk Mitigation

Data443 Risk Mitigation provides next-generation cybersecurity products and services in the area of data security and compliance.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF)

Enterprise Incubator Foundation (EIF) of Armenia is one of the largest technology business incubators and IT development agencies in the region.

TrustMAPP

TrustMAPP

TrustMAPP automates cybersecurity & privacy assessments, with universal workflow, allowing teams to generate analytics and recommendations to align priorities for improvement.

NeuVector

NeuVector

NeuVector, the leader in Full Lifecycle Container Security, delivers uncompromising end-to-end security from DevOps vulnerability protection to complete protection in production.

Pentest Limited

Pentest Limited

Pentest Limited provide information security consultation, penetration testing & red teaming services to companies across the globe.

Nassec

Nassec

Nassec is a Cyber Security firm dedicated to providing the best vulnerability management solutions. We offer tailor-made cyber security solutions based upon your requirements and nature of business.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.