News

2016-10-04

Difficult: Attracting Women To Cybersecurity

Fighting Stereotypes: Women make up only 10% of the global cybersecurity workforce.

2016-10-04

State Sponsored Hackers: Finding The Country Behind The Attack

Security experts don't just want to know how a cyber attack happens, but what country the attack is coming from.

2016-10-05

Drone-Visuality: The Psychology Of Killing

The drone camera, and the technological nexus it is situated within, enables killing to become a networked phenomenon.

2016-10-03

UK’s New National Cyber Security Centre

Britain's war against the soaring number of cyber-attacks is to be led from a new HQ in the centre of London opened this week.

2016-10-03

Cyber Warfare TV Series

The Director of the acclaimed 'Zero-Days' documentary feature film is to make a new TV drama series provisionally titled 'Stuxnet'.

2016-09-30

What To Know About Space Security

Space is increasingly important to the planet’s infrastructure - but it is also a potential battleground.

2016-09-30

More Questions About The Yahoo Breach

Pressure is mounting on Yahoo to admit when it knew about the attack, & whether there was a delay in reporting it.

2016-09-30

Twitter On The Block: Offers Over $13B

Both Google and Salesforce are interested in buying the company. Microsoft and Verizon have also been knocking.

2016-10-03

SWIFT Says Bank Cyber Attacks Are Here to Stay

SWIFT has admitted that cyber attacks are cracking the international bank messaging system & poor local security has grown worldwide.

2016-09-30

An Historic AI Partnership

The world’s largest technology companies hold the keys to some of the largest databases on our planet. Is that really healthy for society?

2016-10-03

AI Will Transform Microsoft

Microsoft are investing heavily in the belief that deep learning and artificial intelligence will transform the company.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

IGEL Technology

IGEL Technology

IGEL Technology is one of the world's leading thin client vendors. Thin clients increase data security and compliance.

Censornet

Censornet

Censornet's autonomous, integrated cloud security gives mid-market organisations the confidence and control of enterprise-grade cyber protection.

TSUNAMI

TSUNAMI

The TSUNAMi center focuses on software and system security and how trustworthy software can be built from COTS software components.

CSIRT Panama

CSIRT Panama

CSIRT Panama is the national Computer Incident Response Team for Panama.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

Hut Six Security

Hut Six Security

Train, test and track your Information Security culture through information security awareness training and customised phishing simulation campaigns.

Polaris Infosec

Polaris Infosec

Polaris Web Presence Protection (WPP) is powered by our proprietary artificial intelligence and machine learning engine to ensure that attacks are stopped before they affect your business.

SecureLogix

SecureLogix

SecureLogix deliver a unified voice network security and call verification solution. Protect against call attacks & fraud.

Debevoise & Plimpton

Debevoise & Plimpton

Debevoise & Plimpton LLP is a premier law firm with market-leading practices in areas including Data Strategy & Security.

Stryve

Stryve

Stryve is a leading carbon-neutral provider of specialist cloud and cybersecurity services in Europe.

Exalens

Exalens

With deep roots in AI-driven cyber-physical security research and intrusion detection, at Exalens, we are enhancing operational resilience for cyber-physical systems at the OT edge.

OSC Edge

OSC Edge

OSC was founded with the vision of providing expert solutions in IT to government and businesses. OSC Edge empowers organizations with solutions that prepare them for today and tomorrow.

Esprinet

Esprinet

The Esprinet Group is an enabler of the technology ecosystem: a team of people who promote access to technology through an extensive network of professional resellers.

ClearSky Cyber Security

ClearSky Cyber Security

ClearSky cyber security provides cyber solutions, focused on threat intelligence services, mainly for the financial sector, critical infrastructure, public sector and the pharma sector.

IT Voice

IT Voice

IT Voice specializes in Managed IT and VoIP solutions. Our focus is simplifying the technology so our customers can stay focused on what they do best.

Morrow Global Network

Morrow Global Network

Morrow is the global venture network for venture accelerators, studios, hubs, and their visionary leaders.