FREE TO VIEW


« Back to News

2016-07-27

Ransomware: Should You Pay The Ransom?

Security professionals dread the day when they learn that ransomware has infiltrated their network and started encrypting files & drives.

2016-07-26

US Carmakers Want Hackers To Help Them Improve Cybesecurity

Today's automobile is rapidly becoming a computer on wheels, with more micro-processing power than can be found in a typical home or office.

2016-07-26

Snowden iPhone Case Alerts Users To Surveillance

Edward Snowden has helped design a mobile phone case that shows when a smartphone is transmitting information that could be monitored.

2016-07-26

US Cyber Mission Force Nearly Ready for Action

The new cyber force will eventually contain over 6000 operatives split into 133 groups, with both offensive and defensive missions.

2016-07-26

Cloud Video Architecture Improves Emergency Services Response

Visual data can be critical in knowing where to send emergency services personnel, tracking suspects, or detecting hazardous materials.

2016-07-25

Cybersecurity: The Human Dynamic

Ultimately, cyber security is governed by choices made by a human sat at a keyboard.

2016-07-25

Criminals Invent Clever New Way To Plant Banking Malware

Watering Hole Attack: Malicious executable bug contained inside a file that installed a legitimate administrative tool.

2016-07-25

Civil Liberties Group Crashes Thailand Government Website

A cyber-attack by a Thai group opposed to the “Single Gateway” brought down a major government website.

2016-07-25

Cyberwar Against Islamic State Is Struggling

The so-called "cyber bombs" that the US military is virtually dropping on Islamic State targets aren't working as well as first hoped.

2016-07-22

In The UK Cybercrime Has Overtaken Traditional Crime

In a sign of the times, cybercrime has now surpassed all other forms of UK crime according to the National Crime Agency (NCA).

2016-07-22

Artificial Brains to Protect Against Cyberattacks

Solutions that apply machine learning to artificial intelligence are the next step in cybersecurity.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NextVision

NextVision

NextVision is a Cybersecurity and Technology company offering a range of solutions and services for Security, Compliance and IT Infrastructure Management.

Cog Systems

Cog Systems

Cog Systems offer an embedded solution built on modularity, proactive security, trustworthiness, and adaptability to enable highly secure connected devices.

EBRAND Services

EBRAND Services

EBRAND, the European experts for brand protection on the Internet. We offer a full set of services including cybermonitoring, fighting counterfeiting offences and online security.

e-Careers

e-Careers

e-Careers is an edtech institution that provides industry recognised courses and up-skilling solutions to individuals and organisations.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

Amnesty Tech

Amnesty Tech

Amnesty Tech's Security Lab leads technical investigations into cyber-attacks against civil society and provides critical support when individuals face such attacks.

GrayMatter

GrayMatter

GrayMatter provides Advanced Industrial Analytics, OT Cybersecurity, Digital Transformation and Automation & Control services to clients across the U.S. and Canada.

Raman Power Technologies

Raman Power Technologies

Raman Power Technologies focus on bringing value and solving business challenges through the delivery of modern IT services and solutions including cybersecurity.

Entech

Entech

Entech is a managed IT service provider. We work behind the scenes on your network to ensure data security and integrity.

Delta Partners

Delta Partners

Delta Partners is a venture capital firm investing in Ireland and the United Kingdom with a strong focus on early stage technology companies.

Dynamic Networks

Dynamic Networks

Dynamic Networks provide Managed Cloud Services; Unified Communications; Security & Compliance Services and Network & Infrastructure Services for both Public Sector and Private sector businesses.

Secure Halo

Secure Halo

Secure Halo has been protecting the intellectual assets and sensitive information of the federal government and private sector for 20+ years, through our proactive approach to risk and cybersecurity.

Cloudaeris

Cloudaeris

Cloudaeris is a trusted Microsoft Partner, and we've got what it takes to make your business more efficient and agile.

Blind Insight

Blind Insight

Field-level searchable encryption plus fine-grained programmable access controls. All wrapped neatly in developer-friendly APIs and SDKs. Data protection perfection.

Ridgeline International

Ridgeline International

Ridgeline helps organizations manage digital risk through data privacy and secure infrastructure solutions.

Rocket Software

Rocket Software

Rocket Software helps customers in all industries solve their most complex IT challenges, across infrastructure, data, and applications — with solutions that simplify, not disrupt.