FREE TO VIEW


« Back to News

2015-09-22

FBI Urges Firms to Plan For Cyber Attack

An FBI security expert calls on businesses of all sizes to make a cyber incident response plan to combat the big increase in global security threats.

2015-09-24

Why Cybercrime Now Exceeds Conventional Crime

Online crime worldwide is increasingly displacing conventional forms of property crime and often goes unreported and uninvestigated.

2015-09-25

Using Threat Intelligence Against Cybercriminals

Companies and governments do not traditionally share data about successful attacks. Threat Intelligence can fix that.

2015-09-22

The Shocking State of Cybercrime in Russia

Stolen credit cards, fraud, banking information theft & malware infections. Stealing from cryptocurrency wallets ... we could go on.

2015-09-22

Why Aren’t Companies Using Military Security?

Why do defense companies have classified networks to prevent cyber attack, while companies handling our critical utilities don’t?

2015-09-22

Vodafone Leaked Email on 'hacking' of Reporter

Vodafone Australia under pressure over the potentially unlawful access of private phone records to track down a journalist’s source.

2015-09-25

UK’s Surveillance Dragnet Legal Challenge

A challenge to UK surveillance legislation aims to discover the scope of illegal data sharing taking place between the NSA and GCHQ.

2015-09-24

State Proxies & Plausible Deniability: Challenging Conventional Wisdom

States use proxies to claim plausible deniability for their cyber attacks. Does this reduce the risk of retaliation? Opinion by Jamie Collier

2015-09-21

Russia in Ukraine & Syria: US Revise Cyber Budget

Russia’s involvement in both Syria & Ukraine and it's overall role in cyberwarfare is the Pentagon's primary concern.

2015-09-21

UK Drone Strike on ISIS Raises Legal Questions

Further clarification is needed on the legal justification for the UK’s drone strike in Syria. Opinion by Harriet Moynihan

2015-09-25

What Does Facebook Want With AI?

Study into artificial intelligence research is no longer the preserve of universities.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Pluralsight

Pluralsight

Pluralsight helps enterprises build technology skills at scale with expert-authored courses on today’s most important technologies including information and cyber security.

LogmeOnce

LogmeOnce

LogmeOnce provides users with solution to multiple Password problems, Single Sign-On (SSO), and Identity Management.

International Telecommunication Union (ITU)

International Telecommunication Union (ITU)

ITU is the United Nations specialized agency for information and communication technologies – ICTs. Areas of activity include cybersecurity.

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

Snyk

Snyk

Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world.

FTAPI Software

FTAPI Software

FTAPI SecuTransfer is a software solution for end-to-end encrypted data exchange of large and sensitive data with customers and partners.

IPQualityScore (IPQS)

IPQualityScore (IPQS)

IPQS anti-fraud tools provide a real-time fraud score to analyze how likely a user or visitor is to engage in fraudulent behavior.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

Infosequre

Infosequre

Infosequre builds up your security awareness culture and turns your employees into the first line of defense against cyber risks.

Almond

Almond

Almond is positioned as a key independent French player in audit and consulting in the fields of Cybersecurity, Cloud and Infrastructure.

FortKnoxster

FortKnoxster

FortKnoxster is a cybersecurity company within the Crypto & FinTech space. Our encryption technologies are blockchain integrated.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

Kubus Hitam

Kubus Hitam

Kubus Hitam are a research-based company focused on cyber security. we strongly believe that innovation and safety are the two keywords for the future business market.

Memcyco

Memcyco

Memcyco is a provider of cutting-edge digital trust technologies to empower brands in combating online brand impersonation fraud, and preventing fraud damages to businesses and their clients.

Heyhack

Heyhack

Heyhack is a SOC 2 Type II certified automated penetration testing platform for web apps and APIs.

LMNTRIX

LMNTRIX

LMNTRIX eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent and respond to cyberattacks.