News

2016-06-10

You Should Not Trust The Media

Hackers impersonate journalists to plant spyware.

2016-06-07

Seven Cyber-Security Myths Debunked

Security myths cause organisations to incorrectly assess threats, misallocate resources and set inappropriate goals.

2016-06-07

Real-life RoboCop Will Replace Human Cops By 2020

Dubai Police are developing robots capable of interacting with people and performing some of the responsibilities of a police officer.

2016-06-07

SWIFT Hackers Linked to ‘North Korean’ Lazarus Group

Symantec can link the malware used by the Sony hackers to attacks on the SWIFT interbank platform.

2016-06-07

Open Source Intelligence Can Predict Terrorist Attacks

Predata specialize in finding links between online interactions and upcoming physical events using metadata from YouTube and Wikipedia

2016-06-07

Unlikely Partners Build High Speed Trans-Atlantic Cable

MAREA: Microsoft and Facebook have recently announced that they are teaming up to build a subsea cable.

2016-06-06

Cyber Security On the High Seas

Cyber technologies have emerged as essential to the operation of maritime cargo vessels.

2016-06-06

The CIA Is Driving Cyber Intelligence In Australia

Cyber intelligence is much more than IT security and Australia is looking for outside help to update its intelligence practices.

2016-06-08

First Shots Of A New Cyber War

Iranian and Saudi Arabian hacking groups are throwing virtual punches. Are the two countries heading towards an outright cyber-war?

2016-06-01

Open Source Data Reveals Police Blunders

A blogger in New York has used public data to prove that the NYPD ticketed thousands of cars that were parked legally.

2016-06-06

Achieving Holistic Cybersecurity

CIOs and CISOs need timely cyber security insights to take proactive action, because today's security challenges are greater than ever.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Beame.io

Beame.io

Beame.io is an information security company that distributes open source authentication infrastructure based on encryption.

Centurion Information Security

Centurion Information Security

Centurion Information Security is a consulting firm based in Singapore that specialises in penetration testing and security assessment services.

e-Lock

e-Lock

e-Lock services include IT security consulting and training, security systems integration, managed security and technical support.

Pryv

Pryv

Pryv is a Swissmade software for privacy, personal data collection, usage, sharing and storage.

ITonlinelearning

ITonlinelearning

ITonlinelearning specialises in providing professional certification courses to help aspiring and seasoned IT professionals develop their careers.

Prolimax

Prolimax

Prolimax deliver innovative solutions to IT Manufacturers, Distributors, Resellers and End-users including Data Erasure and secure IT Asset Disposition (ITAD)

CYBAVO

CYBAVO

CYBAVO is a cryptocurrency security company founded by experts from the cryptocurrency and security industries.

DataPassports

DataPassports

DataPassports is a data-centric security and privacy solution that enforces privacy and security from end-to-end with transparent protection of data at the source.

Russell Reynolds Associates

Russell Reynolds Associates

Russell Reynolds Associates is a global leadership advisory and search firm with functional expertise in Digital Leadership, Data & Analytics, and Compliance.

Cybrella

Cybrella

Cybrella offers professional cybersecurity services for small to medium sized businesses and to larger enterprises looking to expand their cybersecurity capabilities.

Sify Technologies

Sify Technologies

Sify is the largest ICT service provider, systems integrator, and all-in-one network solutions company on the Indian subcontinent.

Strivacity

Strivacity

Strivacity lets brands quickly add secure login and identity management capabilities to their customer-facing applications without tying up an army of developers or consultants to do it.

Cybecs Security Solutions

Cybecs Security Solutions

Cybecs was founded to address rapid technological advancement, changing business models, global privacy regulations, and increasing cyber threats for global organizations.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

Cytracom

Cytracom

Cytracom delivers powerful yet intuitive solutions that enable MSPs and ITSPs to meet the challenges of security, compliance, and connectivity.

HeroDevs

HeroDevs

HeroDevs is the trusted leader in providing secure, long-term support for deprecated open-source software.