FREE TO VIEW


« Back to News

2015-05-26

EU’s 'point of no return' if Internet Firms Not Regulated

Amazon, Etsy and Booking.com are all named in a leaked document as having 'undue power' over their markets.

2015-05-26

Machine Learning for Cybersecurity

Traditional security systems are passive and a small code change by attackers can lead to even the most secure networks being breached.

2015-05-26

Redefining Your Data Protection Strategy

IT infrastructure needs to evolve, particularly for data protection. (Report)

2015-05-26

US Cyber Security Insurance Developments

US insurance regulators have increased their scrutiny of cyber security measures taken by insurance companies.

2015-05-24

Silicon Valley a Major Player in Cyberwarfare

US Department of Defense will provide venture capital funding to startups that can help the Pentagon develop more advanced cybersecurity.

2015-05-27

Cyber Crime on a Global Scale

Cyber crime is ubiquitous, from intercepting your car's bluetooth, to using apps & the Internet to steal private details of millions of citizens.

2015-05-22

FBI Director says ISIS Could Cyberattack the US

ISIS is “waking up” to the idea of using sophisticated malware to cyberattack critical infrastructure in the US.

2015-05-22

UK Rewrites Hacking Laws to Give GCHQ Immunity

Changes to the Computer Misuse Act were secretly introduced over a year ago.

2015-05-22

Device to protect your vehicle from “Sticky bombs”

’Advanced Car Protection’ will detect any hidden device placed under a parked car and will issue an alert in real time.

2015-05-22

Snowden Sees Victory – But it’s From a Distance

For an international fugitive hiding out in Russia from American espionage charges, Edward J. Snowden gets around.

2015-05-22

German BND Intelligence Cooperation with NSA has Actually Expanded.

German and US intelligence agencies are cooperating on a scale and in ways that are only now becoming apparent.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

Baker McKenzie

Baker McKenzie

Baker & McKenzie is an international law firm. Practice areas include Data & Technology.

Ubiq Security

Ubiq Security

Ubiq has developed a software solution that secures any type of data, on any device, anywhere, with nearly no impact to system performance or user experience.

Dracoon

Dracoon

DRACOON is market leader in the German-speaking region for secure enterprise file sharing.

Security BSides

Security BSides

Security BSides is the first grass roots, DIY, open security conference in the world!. BSides is a community-driven framework for building events for and by information security community members.

Granted Consultancy

Granted Consultancy

Granted Consultancy is a business consultancy that specialises in securing funding to support companies with the development and commercialisation of new and innovative products and technologies.

Aujus Cybersecurity

Aujus Cybersecurity

Aujas is a pure-play cyber security services company with deep expertise in Identity and Access Management, Managed Security and Security Testing services.

Cyphere

Cyphere

Cyphere is a cyber security company that helps to secure most prized assets of a business. We provide technical risk assessment (pen testing/ethical hacking) and managed security services.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions to the alternative investment industry.

SOOS

SOOS

SOOS is the easy-to-integrate software security solution for your whole team. Build, catch, and fix vulnerabilities with SOOS Software Composition Analysis.

Darkstrike / Qeros

Darkstrike / Qeros

Complete your defense in-depth strategy with Darkstrike, the world’s most advanced quantum-secure and ransomware-proof data platform for any use case, ensuring unconditional data security.

Global Resilience Federation (GRF)

Global Resilience Federation (GRF)

GRF builds, develops and connects security information sharing communities for mutual defense.

Protega

Protega

Protega is a company specialized in Managed Cybersecurity Services (MSS) & SOC 24×7; management, risk & compliance (GRC); implementation of data protection technologies; and Red Team services.

DeepStrike

DeepStrike

DeepStrike is a cutting-edge penetration testing company that specializes in providing Penetration Testing as a Service (PTaaS) and continuous penetration testing solutions.