FREE TO VIEW


« Back to News

2016-03-01

Cybercrime: Is the Sky Really Falling?

Cybercrime is so rampant today that no-one is immune. Not even the chief examiner for Digital Forensics Inc, Daniel Libby.

2016-03-01

One-Third Of IT Staff Are Hackers

About a third of IT staff have hacked an organization, sometimes the one they work for.

2016-03-01

Belgian Government Plagued By Hackers

Latest Incident: Hackers claim to have made a successful DDoS attack on the Belgian National Bank, shutting down the bank’s website.

2016-03-01

Inside The FBI's Encryption Battle With Apple

The FBI searched for a compelling case that would force Apple to weaken iPhone security – and then the San Bernardino shooting happened.

2016-03-01

Forget Trident & Welcome To Cyber Warfare

Forget debates about Britain’s nuclear deterrent. New technology means a country can be brought to its knees with the click of a mouse.

2016-02-24

Executive Education: Brown University’s Master In Cybersecurity

Cybersecurity professionals feel they lack the necessary skills and resources to keep up with the ever increasing demands for cybersecurity.

2016-02-24

Cyber Risk Insurance Is A Patchwork

Use of cyber-specific wording and products may be an effective way of filling gaps of cover which exist in conventional lines of insurance.

2016-02-26

Hidden In Plain Site: Paedophiles Use Facebook Groups

Paedophiles are using secret groups on Facebook to post and swap obscene images of children.

2016-02-24

Israel Is 15 Years Ahead in Cyber Warfare

Confronting the range of rapidly evolving cyber warfare challenges has transformed the Israeli military.

2016-02-26

Cybersecurity To Go On The Offensive

Organizations with a sophisticated approach to cybersecurity are no longer satisfied with locking the doors after the robbery has been committed.

2016-02-24

Know Your Enemy: The Most Popular Hacking Methods

The Easy Way: Outsiders want to become insiders with the least possible effort, and insiders help them do so - mostly accidentally.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Solarflare

Solarflare

Solarflare is a leading provider of intelligent networking I/O software and hardware platforms that accelerate, monitor and secure network data.

ForgeRock

ForgeRock

ForgeRock, the leader in digital identity, delivers comprehensive Identity and Access Management solutions for consumers, employees and things to simply and safely access the connected world.

vArmour

vArmour

vArmour is the industry’s first distributed security system that provides insight and control for multi-cloud environments.

Centre for the Protection of National Infrastructure (CPNI)

Centre for the Protection of National Infrastructure (CPNI)

CPNI works with the National Cyber Security Centre (NCSC), Cabinet Office and lead Government departments and agencies to drive forward the UK's cyber security programme to counter cyber threats.

Riverside Research

Riverside Research

Riverside Research is a not-for-profit organization chartered to advance scientific research in areas including Trusted & Resilient Systems.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

NextVision

NextVision

NextVision is a Cybersecurity and Technology company offering a range of solutions and services for Security, Compliance and IT Infrastructure Management.

MicroEJ

MicroEJ

MicroEJ is a software vendor of cost-driven solutions for embedded and IoT devices.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

SDG Corp

SDG Corp

SDG is a global cybersecurity, identity governance, risk consulting and advisory firm, addressing complex security, compliance and technology needs.

Red River

Red River

Red River is a technology transformation company, bringing 25 years of experience and mission-critical expertise in analytics, cloud, collaboration, mobility, networking and security solutions.

Periculus

Periculus

Periculus makes managing digital risk simple. Its integrated platform offers access to purchase cyber insurance and cyber security solutions uniquely tailored to fit the needs of every business.

gener8tor

gener8tor

The gener8tor Cybersecurity Accelerator offers a cutting-edge program in San Antonio, home to the second-largest concentration of cybersecurity experts in the United States.

Harbottle & Lewis

Harbottle & Lewis

Harbottle & Lewis is a leading UK-based law firm focused on the Private Client and Technology, Media and Entertainment sectors.

Pangu Laboratory

Pangu Laboratory

Beijing Qi an Pangu Laboratory Technology Co., Ltd. was established on the basis of Pangu laboratory, a well-known cyber security team.

JLS Technology

JLS Technology

Since 2007, JLS Tech has been recognized as one of the world’s most innovative cybersecurity and technology operations leaders.