FREE TO VIEW


« Back to News

2016-08-15

James Bond - Pen Tester

Pen-testing can use deception to counter spear-phishing and other superficially benign threats.

2016-08-15

5 Reasons IT Leaders Should ImproveTechnical & ‘Soft’ Skills

The ability to communicate technical information to a non-technical audience is increasingly important as IT integrates with overall business functions.

2016-08-12

Hackers Help FBI Fight Cybercrime

The FBI needed undisclosed outside help to crack the San Bernadino shooter's iPhone. Now they are looking for help to fight ransomware.

2016-08-12

Hacking May Prompt Heightened US Election Security

US Security officials are thinking of designating elections as national critical infrastructure after recent hacking attacks on the political parties.

2016-08-10

Banks Look Up To The Cloud

Banks are growing more comfortable using other companies’ servers instead of their own closely guarded data centers.

2016-08-10

ISIS Is Tooling Up For Cyber Jihad

Islamic terrorists are arming themselves with the technical tools & expertise to attack the online systems underpinning critical infrastructure.

2016-08-12

Defensive Measures: Estonia Will Store Citizens’ Data In The UK

Estonia is planning to back up its entire store of citizen data in the UK, fearing another cyberattack from neighboring Russia.

2016-08-10

Did Munich Gunman Get His Weapon On The Dark Web?

Unlike the U.S, it is quite hard to get access to automatic weapons in Germany. So where did the gunman get his weapon?

2016-08-10

Candidate Trump Supports Russian ‘cyber warfare’ Against US

Backlash over comments during a recent press conference in which he urged Russian hackers to steal rival candidate Hillary Clinton’s emails.

2016-08-10

European Privacy Directive: Encryption Without Backdoors

The EU rules designed to protect privacy in electronic communications need to reflect the world that exists today.

2016-08-13

UK Security Agencies Say Mass Internet Spying Is Crucial

Privacy Trial Begins: UK spy agencies contend that interception of communications is critical in protecting the country against terrorism.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

Norton Rose Fulbright

Norton Rose Fulbright

Norton Rose Fulbright is a global business law firm. Practice areas include Data protection, Privacy and Cybersecurity.

Cybercrowd

Cybercrowd

Cybercrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

Kuratorium Sicheres Österreich (KSO)

Kuratorium Sicheres Österreich (KSO)

KSO is an independent non-profit association that has set itself the goal of making Austria safer as a national networking and information platform for topics of internal security.

National Cyber Security Centre (NCSC) - Ireland

National Cyber Security Centre (NCSC) - Ireland

The National Cyber Security Centre (NCSC) is the operational side of the Department of Communications in regard to network and information security in the Republic of Ireland.

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions provides advanced, innovative data security solutions for enterprises, professionals and individuals.

Sponge

Sponge

Sponge is a world-renowned digital learning provider on a mission to make learning unforgettable.

Incognia

Incognia

Incognia have created a ubiquitous private identity based on location behavior, that enables a personalized frictionless experience with mobile apps and connected devices.

Fireblocks

Fireblocks

Fireblocks is a digital asset security platform that helps financial institutions protect digital assets from theft or hackers.

HighGround

HighGround

HighGround offer a Cyber Security Solution for everybody, regardless of skillset, to feel empowered in their security experience in reaching Cyber Resilience.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.

DarkHorse Security

DarkHorse Security

DarkHorse exists to make it easy and affordable for organizations to be able to identify their cybersecurity vulnerabilities.

Terra Security

Terra Security

Terra Security is the first agentic-AI platform built for web application penetration testing.