News

2015-12-11

Microsoft Leads FBI Coalition To Destroy Botnet

To take down Win32/Dorkbot, Microsoft worked with ESET, Department of Homeland Security, Europol, FBI and Interpol.

2015-12-11

Australian Degree Course on Cyber War and Peace

An online Masters degree to equip graduate students with abilities to understand operational, ethical & informational challenges for IT security.

2015-12-09

Cyber War Pre-emption Is The Key to Defense

The United States' best defense against a crippling cyber attack could be a more visible offensive lineup.

2015-12-09

Gateway For Hackers

Routers - devices that connect people to the Web, sometimes called “the backbone of the Internet”, are dangerously vulnerable to hackers.

2015-12-09

Has The US Become Complacent About Resisting Cyber Attacks?

No longer in the news: Accounts of cyberattacks these days seem to produce yawns.

2015-12-09

First Ever EU Rules On Cybersecurity

Europe's critical digital infrastructure will be required to meet basic security standards.

2015-12-09

Cybersecurity Is A Big Government Problem

Constant vigilance is required to protect US government systems. Unfortunately, these same systems might not be up to the task.

2015-12-09

Insurance Tech Faces the Internet of Things Arms Race

As business intelligence and analytics technologies improve, insurers are developing strategies around easily accessible external data sources.

2015-12-10

Hacktivist group 'Anonymous' declares Dec 11 as ISIS 'trolling day'

Anonymous has declared a cyber war on ISIS under the hashtag #OpParis.

2015-12-09

Building a Narrative-Driven Security Model

Most organizations suffer from alert fatigue - they find themselves inundated with far too many alerts, each of which has too little context.

2015-12-09

Young People’s Concerns About Job Automation

It turns out many young Britons have no understanding of how this could impact their career at all.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Trulioo

Trulioo

Trulioo is a leading global identity and business verification company providing secure access to data sources worldwide to instantly verify consumers and businesses online.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

Honeywell Process Solutions (HPS)

Honeywell Process Solutions (HPS)

Honeywell's Industrial Cyber Security Solutions help plants and critical infrastructure sectors defend the availability, reliability and safety of their industrial control systems.

Enigmatos

Enigmatos

Enigmatos is an Israeli based Automotive Cyber Security company. We provide solutions to the ever growing threat of vehicle hacking.

DFI

DFI

DFI is a global leading provider of high-performance computing technology across multiple embedded industries.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

Knovos

Knovos

Knovos is a leading technology innovator developing solutions for automating, integrating, and innovating Information Governance.

Stamus Networks

Stamus Networks

Stamus Networks offers Scirius Security Platform solutions that marry real-time network traffic data with enhanced Suricata intrusion detection (IDS) and an advanced analytics engine.

nsKnox

nsKnox

nsKnox is a fintech-security company, enabling corporations and banks to prevent fraud and ensure compliance in B2B Payments.

Security Risk Management (SRM)

Security Risk Management (SRM)

SRM provide a comprehensive security risk management service encompassing people, processes, technology, governance, compliance and risk management.

Sendmarc

Sendmarc

Sendmarc automates the process of protecting your domain from being used in email impersonation and phishing attacks.

Solvo

Solvo

Solvo enables security teams and other stakeholders to automatically uncover, prioritize, mitigate and remediate cloud infrastructure access risks.

Zenzero

Zenzero

Zenzero simplifies technology adoption and supports our customers through managed and outsourced IT support.

TraitWare

TraitWare

The TraitWare mission is to increase user and company security while simplifying access to digital and physical resources through the elimination of the need for usernames and passwords.

Argenta Talent Acquisition

Argenta Talent Acquisition

Argenta Talent Acquisition is a recruitment partner specializing in Space and Defense, Intelligence Community, all things Technical, Cyber, and Logistics.