FREE TO VIEW


« Back to News

2015-11-04

Stolen Credit Card Details Cost £1 Online

In the wake of the TalkTalk cyber-attack credit card details are on sale online for as little £1 each as fears rise over the security of personal data

2015-11-04

UK Forced To Backtrack on Internet ‘snooping’

While the U.S Senate has passed CISA unamended the U.K. Government is struggling to pass it's new surveillance law.

2015-11-03

EU Will Fund Car, Hospital & Airport IT Security

ENISA is stepping up to address numerous threats to critical infrastructure and help governments & businesses plan their response.

2015-11-03

U.S Navy Plans To Deploy A Submarine Drone Squadron By 2020

Submarine drones that can operate with minimal human intervention close to vital areas and sensitive targets

2015-11-01

Third Man Held Over TalkTalk Security Breach

TalkTalk has said the scale of the security breach was "much smaller" than originally suspected.

2015-11-02

Cyber Attack Recovery Times Cause Big Concerns

When it comes to limiting damage and preventing data breaches, time is the biggest challenge for security and risk professionals.

2015-10-31

ISPs Asked To Block Pirate Sites

UK Internet service providers have been asked to block access to dozens of URLs that are suspected of linking to pirated content.

2015-11-01

Cyber London for Europe’s Brightest Cyber Security Start-ups and Entrepreneurs

The CyLon cybersecurity start-up accelerator and incubator Winter Programme starts soon - the application deadline is 6th November.

2015-11-02

New Material Promises NSA-proof Wallpaper

A flexible material, thin and tough for wallpaper or woven fabric that can keep electronic emissions in, and electromagnetic pulses out.

2015-11-06

Europe Is Spying on You

EU countries are amending their counter-terrorism legislation to grant more intrusive powers to security services.

2015-11-02

Poaching On the Rise For Big Data Professionals

The pressure is building on companies to land top talent in the job market.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

WhiteHat Security

WhiteHat Security

WhiteHat’s products enable customers to “Hack Yourself First” so that they gain a greater understanding of the actual risk to their business.

Certification Europe

Certification Europe

Certification Europe (now Amtivo Ireland) is an accredited certification body which provides ISO management system certification, including ISO 27001.

Protocol Policy Systems

Protocol Policy Systems

Protocol Policy Systems specialise in IT policy deployment and management systems that deliver compliance and secure computing environments.

Telspace Africa

Telspace Africa

Telspace Africa provide the highest level of IT security solutions including advisory, penetration testing, vulnerability assessments, red teaming, social engineering and training.

Honeynet Project

Honeynet Project

The Honeynet Project is a leading international non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

Aujas Cybersecurity

Aujas Cybersecurity

Aujas has deep expertise and capabilities in Identity and Access Management, Risk Advisory, Security Verification, Security Engineering, & Managed Detection and Response services.

ICS Cyber Security Conference

ICS Cyber Security Conference

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity.

TM One

TM One

TM One is the enterprise and public sector business solutions arm of Telekom Malaysia Berhad (TM) Group.

WidePoint

WidePoint

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions.

Noname Security

Noname Security

Noname Security detects and resolves API vulnerabilities and misconfigurations before they are exploited.

TWC IT Solutions

TWC IT Solutions

Since 2011, TWC IT Solutions has offered managed IT Support, Cybersecurity, Disaster Recovery, Contact Centre and Business Connectivity services to clients across 24 countries globally.

Sikich

Sikich

Sikich LLP is a leading professional services firm specializing in accounting, advisory, technology and managed services.

Endure Secure

Endure Secure

Endure Secure is a managed cyber security & information security consultancy. Our passion for IS and our understanding of the threat landscape is reflected in the services that we provide.

Aim Security

Aim Security

Aim empowers enterprises to unlock the full potential of GenAI technology without compromising security. GenAI makes business better - Aim makes GenAI secure.

Mindflow

Mindflow

Mindflow is dedicated to bringing answers to the challenges the cybersecurity field and beyond face today.