FREE TO VIEW


« Back to News

2017-01-30

Iranian Malware Delivered Via Fake Oxford University Sites

An Iran-linked advanced persistent threat (APT) group has used fake University of Oxford websites to deliver malware to victims.

2017-01-30

Cyberwar: How Prepared Is Nepal?

Vulnerable: The main reason Nepal has become a target for cyber attackers is the chaos and confusion caused by a big earthquake.

2017-01-30

How Much Cyber Insurance Is Enough?

How a top security manager feels about cyber insurance often may have a lot to do with the type of company he or she works for.

2017-01-25

GCHQ Wants Teenage Girls To Join The Cybersecurity Fight

Teenage girls who spend time online and on social media could become the UK's spies of the future. Or so Britain's intelligence agency hopes.

2017-01-27

Twelve Things To Know About Self Driving Cars

From forecourt to scrapyard, a new car in the UK lasts an average 13.9 years. If you were to buy a new one today, it might be the last you ever buy.

2017-01-27

MI6 Used Information From The Trump Dossier

MI6 used information gathered by ex-agent Christopher Steele in his Trump investigation to warn against Russian cyberattacks.

2017-01-25

Facebook To Introduce Fake News Tools

Facebook is introducing new tools in Germany to help combat the spread of fabricated news stories before the parliamentary elections.

2017-01-25

Give Robots Human Status

The EU parliament wants regulations to govern the use of robots and AI, including a form of “electronic personhood”.

2017-01-25

Anonymous To Trump: You will ‘Regret’ Next 4 Years

Scary? Anonymous, the loose collective of online hackers, has issued an ominous warning to the new President, Donald Trump.

2017-01-27

Populism & Terror Have Killed Geopolitics

Populist politics and extremism promoted on social media are undermining conventional approaches to international relations. Opinion by Taha Ozhan

2017-01-24

Cyber Attack Concerns Ahead Of French Elections

'No political party can say that their systems are seriously secured': France fears foreign interference in the imminent Presidential elections.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

Quantivate

Quantivate

Quantivate is a provider of web-based Governance, Risk, and Compliance (GRC) software and service solutions.

Assuria

Assuria

Assuria Cyber Security solutions provide protective monitoring of systems and user activity across the whole IT infrastructure.

LEXFO

LEXFO

LEXFO specializes in the security of information systems, assisting clients in protecting information assets using an offensive and innovative approach.

Westminster eForum

Westminster eForum

Wesrtminster eForum runs a series of conferences on matters relating to the UKs Digital Strategy. Topics include Smart Cities and Cyber Security.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

WeSecureApp (WSA)

WeSecureApp (WSA)

WeSecureApp is specialized in providing Cyber Security Solutions to safeguard your applications and networks.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

Hawk Network Defense

Hawk Network Defense

HAWK.io is the First Fully Automated, Multi-Tenant, Cloud-Based, MDR Service Company.

Technology Innovation & Startup Centre (TISC)

Technology Innovation & Startup Centre (TISC)

TISC is a startup incubator at the Indian Institute of Technology Jodhpur (IITJ) and we back deep-tech startups.

Protek International

Protek International

Protek International delivers world-class Digital Forensics, eDiscovery, Cyber Security, and related Advisory services.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

ExchangeDefender

ExchangeDefender

ExchangeDefender provides cybersecurity services that secures your company email and data, and guarantees 24/7 email access.

Association for Uncrewed Vehicle Systems International (AUVSI)

Association for Uncrewed Vehicle Systems International (AUVSI)

AUVSI is the world's largest nonprofit organization dedicated to the advancement of uncrewed systems and robotics. Focus areas include cyber security for uncrewed systems and robotics.

Abissi

Abissi

Abissi offer cyber intelligence, IoT security, automotive security, red teaming, application security and artificial intelligence security services, with a focus on security by design.

ThingsRecon

ThingsRecon

ThingsRecon empowers organisations to continuously map and manage their attack surface, uncover hidden vulnerabilities, and assess supplier cyber hygiene.