FREE TO VIEW


« Back to News

2016-07-22

Improved Security For The Internet-of-Things

Inherently Insecure: Connectivity between IoT devices is often exploited, especially when it involves in-transit data encryption. What can be done?

2016-07-21

'Zero Days' - Hidden World of Cyber Warfare

Documentary: An enthralling espionage thriller about Stuxnet, complete with assassinations and an arsenal of bits and bytes.

2016-07-22

Ransomware Victims Run Into Millions

13m Americans have been targeted by ransomware, malicious software that blocks computer access until the victim pays a sum of money.

2016-07-21

Russia Claims ‘Increase in Cyberattacks by West Spies’

The Kremlin worries that its government agencies are under increasing western attack, and is concerned about skill shortages in government.

2016-07-20

Industrialisation Of Cybercrime Is Disrupting Business

Only 20% of IT decision makers in large multinational corporations are confident their organisation is fully prepared against cybercriminals.

2016-07-20

Hackers Target Thousands of GMails

Google Alert: “Government-backed hackers may be trying to steal your password,”

2016-07-20

Retail Banks Will be Dead Within A Decade

Experts say that Finаnсе will be thе most disrupted induѕtrу in thе nеxt 10 уеаrѕ. Retail banking as we know it will die.

2016-07-20

Ukraine Crisis Fits Cyber War Narrative

It looks like there is a direct connection between the geopolitical climate in combat torn Ukraine and the increase in cybercriminal activity.

2016-07-20

Healthcare CISOs Find Security Vendors Overpromising

Chief information security officers have enough to do trying to safeguard hospitals from an evolving array of cyber risks.

2016-07-19

Malware Targeting Energy Companies

Security researchers have discovered a new malware threat that goes to great lengths to remain undetected while targeting energy companies.

2016-07-19

A Strategic Company: The Internet of Things & How ARM Fits In

ARM Holdings designs mobile and low-power chips found in many IoT devices, the servers that connect them & the devices used to control them.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Brookings Institution

Brookings Institution

The Brookings Institution is a nonprofit public policy organization. Cyber security is covered within the various study areas.

Firebrand

Firebrand

Firebrand is the leader in Accelerated Learning in the field of IT and project management.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

Cyjax

Cyjax

Cyjax monitors the Internet to identify the digital risks to your organisation, including cyber threats, reputational risks and the Darknet.

Hornetsecurity

Hornetsecurity

Meet Hornetsecurity – Leading Cloud Email Security Provider. We protect global organizations so you can focus on what you do best.

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

AKCESK ensures security for trusted services, in particular reliability and security in electronic transactions between citizens, businesses and public authorities.

Garland Technology

Garland Technology

Garland Technology specializes in network access points (TAPs) for 100% visibility allowing you to see every bit, byte, and packet flowing through your network.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

Tetrad Digital Integrity (TDI)

Tetrad Digital Integrity (TDI)

TDI is a world-class consulting firm offering cybersecurity services to government agencies and commercial clients around the world.

Wizard Cyber

Wizard Cyber

At Wizard Cyber, we simplify cyber security, delivering an advanced service that protects your high-risk assets from the complex threats that technology alone can miss, 24/7.

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

BOXX Insurance

BOXX Insurance

BOXX Insurance Inc. is a new type of insurance company for a new type of risk. Cyberboxx is the first fully-integrated cybersecurity and insurance solution for small-to-medium-sized businesses.

Amvia

Amvia

Amvia is a fast-growing telecoms, Internet and Microsoft service provider. We supply voice, data and cyber security services to 100s of small and large companies.

Asimily

Asimily

Asimily’s IoMT risk remediation platform holistically secures the mission-critical healthcare devices that deliver safe and reliable care.

Huntr

Huntr

Huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications.