News

2017-01-06

Ex-MI6 Chief Warns Over Electronic Voting

The stubby pencil and piece of paper that you put your cross on in the ballot box is actually much more secure than anything which is electronic

2017-01-06

Virtual Reality Is Getting Real In 2017

Is VR is going to become the next major computing platform, in the same way that mobile phones have superceded desktop PCs?

2017-01-06

Company Boards Need To Get A Grip.

Corporate leaders, especially boards of directors, aren't taking the necessary actions to defend their companies against cyber attacks.

2017-01-06

Digital Forensics, Incident Response & Attribution

The cost of not taking cyber security seriously today is just like the cost of not having your business properly insured.

2017-01-05

Artificial Intelligence, Self-driving Cars & Cyberwar In 2017

If 2016 was a year of unprecedented disruption in the Technology sector, what does 2017 hold in store? More of the same....

2017-01-04

How Cyber Attacks Will Get Worse In 2017

It was thought 2016 would see more cybersecurity activity than 2015 and it did. Here are some of the escalated challenges to be faced in 2017.

2017-01-04

Russian Military Was Behind Hacking Clinton Campaign

Crowdstrike say they have evidence to link the Clinton campaign hacks with malware used by the Russian military intelligence team, Fancy Bear.

2017-01-03

Cyber Criminals Are Making $200k A Month

Recorded Future have been researching the dark web for cybecrime forums. It turns out the bad guys can make good money stealing from each other.

2017-01-03

Robots Can Build Weapons

Faster, cheaper and more accurate. Raytheon has changed the way it builds deadly missiles.

2017-01-03

The Worst Hacks In 2016

Before 2016, most network intrusions targeted enterprises & large corporations, but last year saw a much more diverse range of victims.

2016-12-30

How Russian Cyber Power Attacked The US

Who's To Blame? The FBI's failure to grasp the scope of the initial attacks on the Democratic party undercut efforts to minimize their impact.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Software Testing News

Software Testing News

Software Testing News provides the latest news in the industry; from the most up-to-date reports in web security to the latest testing tool that can help you perform better.

Seclab

Seclab

Seclab is an innovative player in the protection of industrial systems and critical infrastructure against sophisticated cyber attacks.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

TruNarrative

TruNarrative

TruNarrative provides a unified solution for Identity Verification, Fraud Detection, eKYC, Risk Assessment, AML Compliance and Account Monitoring.

Wynyard Group

Wynyard Group

Wynyard Group is a niche, technology-driven company specializing in Integrated Border Security solutions for enhanced public safety.

British Blockchain Association (BBA)

British Blockchain Association (BBA)

British Blockchain Association (BBA) is a not-for-profit organisation that promotes evidence-based adoption of Blockchain and Distributed Ledger Technologies (DLT) across the public and private sector

SOC Experts

SOC Experts

SOC Experts is a pioneer (we started SOC training well before people realized how big the domain was going to be) and the only institution to provide end-to-end training on Security Operations Centers

Axur

Axur

Discover and eliminate digital fraud and risks on the web. Utilize Axur’s entire AI potential, along with thousands of bots dispersed throughout the surface web as well as the deep and dark web.

FiVerity

FiVerity

FiVerity provides financial institutions with cyber fraud defense to combat a dangerous and growing threat - the convergence of fraud-related theft with sophisticated, high-volume cyber attacks.

Theta432

Theta432

THETA432 is a cybersecurity firm that provides 24/7/365 managed prevention, detection, response, Hybrid SOC, cyber defense monitoring services with dynamically defined defense (3D™).

Slamm Technologies

Slamm Technologies

Slamm Technologies is a trusted IT firm that offers Cyber Security Support, Corporate IT Solutions and Professional IT Training courses with international certification.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

Snare

Snare

Snare is a comprehensive set of event monitoring and analysis tools designed to address critical auditing and security requirements.

Lasso Security

Lasso Security

Lasso Security is a pioneer cybersecurity company ensuring comprehensive protection for businesses leveraging generative AI and other large language model technologies.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.