FREE TO VIEW


« Back to News

2017-04-12

ISPs Can Tell Users About Infected Computers

ISPs can spot malicious patterns of activity over the Internet and even pinpoint the IP addresses that are being used for cybercrime.

2017-04-11

Cloudbleed Is Just The Latest Internet Security Disaster

A tiny coding bug has led to an unknown quantity of data, passwords, personal information, messages & cookies, to leak all over the Internet.

2017-04-11

Google Lawsuit Could Be Fatal For Uber

With a $70bn valuation, Uber has won victories against regulators, taxi companies and many competitors. Now they face a challenge from Google.

2017-04-10

Four Steps To Managing Cyber Security Better

Company boards have a pressing fiduciary responsibility, to promote & support development of robust cybersecurity programmes.

2017-04-10

Geolocation, Russian Hackers & False Flag Operations

Experts at ICIT say malicious actors can easily position their breach so that it can be attributed to Russian state-sponsored hackers.

2017-04-10

ENISA’s Threat Rankings: From Malware To Cyber Spies

Europe's computer security agency has set out a list of the top online threats with a warning that hacking for profit is the biggest trend.

2017-04-10

US Buys Mysterious ISIS Drone Killer

The US Air Force is trying to counter small armed drones and is testing multiple technologies and systems to counter deadly ISIS UAVs in Mosul.

2017-04-10

Trump Administration's Policy On Cybersecurity

'If you're not thinking of cyber first, I don't know what you should be thinking about.' Increased spending on surveillance & encryption.

2017-04-08

Are Employees Your Weakest Link When It Comes To Security?

Your technology could have every safety feature and yet a lack of employee education could instantly compromise all of that. By Jane Frankland

2017-04-07

London Conference: Protecting Critical Infrastructure

SGG- Global: The Cybersecurity Protecting Critical Infrastructure Conference. 16th-17th May 2017 London

2017-04-07

More Details Of Crippling Attack On UK Bank Emerge

Lloyds Bank call in the cybersecurity experts to investigate the attack which stopped a substantial number of customers using their online accounts.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IntaForensics

IntaForensics

IntaForensics offer a full range of digital investigation services and are able to adapt to the individual needs of solicitors, private clients, Law Enforcement Agencies and commercial businesses.

Apcon

Apcon

Apcon's mission is to provide valuable network insights that enable security and network professionals to monitor, secure and protect their data in both physical and virtual environments.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

PCI Compliance Guide

PCI Compliance Guide

The PCI Compliance Guide is one of the leading educational websites available focused exclusively on PCI compliance.

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

The Data Privacy Group

The Data Privacy Group

The Data Privacy Group provide expert professional services underpinned by world leading automation tools and a consulting team specialized in privacy and data protection.

LaoCERT

LaoCERT

LaoCERT is the national Computer Incident Response Team for Laos.

Asvin

Asvin

Asvin provides secure update management and delivery for Internet of Things - IoT Edge devices.

Bradley-Morris

Bradley-Morris

Bradley-Morris is a leading recruiting firm specializing in transitioning military and veteran talent into civilian careers including Cybersecurity.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

Saporo

Saporo

Saporo helps organizations increase their cyber-resistance. Continuously map your attack surface and get the recommendations you need to make your organization more resistant to attacks.

National Cybersecurity Agency (ACN) - Italy

National Cybersecurity Agency (ACN) - Italy

The ACN is the National Authority for Cybersecurity in Italy. the Agency promotes public-private initiatives to strengthen the national cybersecurity and resilience posture.

Ermes

Ermes

Ermes – Intelligent Web Protection provides companies with a solution that effectively secures them against web threats.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

Aliro Security

Aliro Security

AliroNet is the world’s first entanglement Advanced Secure Network solution.

Bluecyber Insurance

Bluecyber Insurance

At Bluecyber, we are revolutionizing the cyber insurance market, democratizing access to digital protection for small and medium-sized businesses.