News

2017-02-21

Female Role Models & The Early Days Of Computing

EDSAC was one of the first computers, developed to undertake complex astronomical calculations. And one of the first users was Dr. Jilly Wheeler.

2017-02-08

Are Terrorists Winning The Digital Arms Race?

Terrorist groups are embracing a wide range of digital tools to recruit members and plan attacks. Some experts say they are winning.

2017-02-21

GoggleBox: Moderate Screen Use 'Boosts Teen Wellbeing'

A study of screen time and mental wellbeing among teenagers suggests moderate use of devices may be beneficial in a connected world.

2017-02-21

The Cyber Security Landscape: A Frightening Picture

The experts at the Institute for Critical Infrastructure Technology paint a frightening picture of the information security landscape.

2017-02-21

Indian Police Training To Crackdown On Electronic Fraud

The Indian government are allocating increased capital in training police officers to crackdown on electronic fraud involving online transactions.

2017-02-21

Nation State Hacking Has A Big Commercial Impact

What impact does the long standing practice of State sponsored hacking to steal secrets and influence elections have on the business world?

2017-02-20

Is There A Truly Secure Messaging App?

More messaging apps than ever support end-to-end encryption. Should they prioritize convenience or security?

2017-02-20

Udacity Offer Deep IT Learning Programs & Nano-Degrees

Startup Udacity is using innovative methods of promoting large scale vocational IT education with focused foundation programs & 'nano degrees'.

2017-02-18

Italian Brother & Sister Cyber Spies Arrested

Two Italians stand accused of having spied on Italian politicians, state institutions, law enforcement agencies, businesses & the Vatican.

2017-02-08

Auditors Need To Know About Cyber Security

Information Security: Auditors have an obligation to educate themselves about cyber security technology if they are to do their job properly.

2017-02-18

Action Fraud: Social Media Used to Steal Charity Donations

An emerging fraud where social media platforms are used to attract donations to overseas welfare charities that do not exist.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Identiv

Identiv

Identiv is a global security technology company that establishes trust in the connected world, including premises, information and everyday items.

Asavie

Asavie

Asavie provide solutions for Enterprise Mobility Management and secure IoT Connectivity.

CodeOne

CodeOne

CodeOne provides solutions for website and web app security.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

Smokescreen

Smokescreen

Smokescreen's IllusionBLACK employs deception technology to detect, deflect and defeat advanced hacker attacks.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

Document Security Systems (DSS)

Document Security Systems (DSS)

DSS anti-counterfeit, authentication, and brand protection solutions are deployed to prevent attacks which threaten products, digital presence, financial instruments, and identification.

Kasada

Kasada

Kasada has developed a radical approach to defeating automated cyberthreats based on its unmatched understanding of the human minds behind them.

Vulcan Cyber

Vulcan Cyber

At Vulcan, we’re modernizing the way enterprises reduce their cyber risk. From detection to resolution, we automate and orchestrate the vulnerability remediation process dynamically and at scale.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

inWebo

inWebo

inWebo is the specialist in multi-factor strong authentication (MFA). We guarantee the security of data and identities in a digital world with increasingly important economic and political stakes.

Amyna Systems

Amyna Systems

Amyna has developed an IoT cybersecurity platform that prevents malignant attacks, helping users to protect themselves from cyberattacks.

SalvageData Recovery Services

SalvageData Recovery Services

Since 2003, SalvageData has been providing high-quality data recovery with the certifications needed to work with any storage media manufacturer.

Entitle

Entitle

Entitle's SaaS-based platform automates how permissions are managed, enabling organizations to eliminate bottlenecks and implement robust cloud least privilege access.