News

2015-11-10

British Police Want Access to UK's Entire Web Browsing History

Retention of weblog data for Police inspection is "perhaps the most contentious and confused aspect of communications data retention".

2015-11-10

A Threat No One Is Talking About - Attack On the Power Grid

The US power distribution system comprises three power grids generating electricity which are vulnerable to attack by a sophisticated hacker.

2015-11-10

Waging Cyberwar In Peacetime

The internet makes civilian targets the easiest to strike and in many instances causalities are not immediate.

2015-11-10

Drone Carrying Drugs Crashes at a US Prison

The first attempt to smuggle contraband into a prison with an unmanned aerial vehicle.

2015-11-09

U.S Tech Companies Shouldn't Give China Code

China has been asking US technology companies to share proprietary information, ostensibly for security purposes.

2015-11-09

IncuBus Ventures Teams Up with PwC to Offer the Future of Work Incubator Programme

London: IncuBus Future of Work incubator hosted by PwC is looking for disruptive cyber security startups.

2015-11-09

Can EU Judges Keep NSA Spying in Check ?

According to EU Justice Commissioner, the NSA's blanket surveillance of Europeans will be subject to judicial review.

2015-11-09

Bank of England Partners With US for Cyberattack Simulation

The Bank of England is set to simulate a major cyberattack in order to test the security protocols being employed by the finance industry.

2015-11-07

New UK Surveillance Bill Appears In The Wake of Snowden

Is the proposed new legislation a gross intrusion of privacy or a sensible anti-terrorism measure?

2015-11-06

Russian Air Crash Investigation Changes The Encryption War

If intercepted communications prove an ISIS bomb caused the crash in Egypt, it could be just the boost surveillance state advocates need.

2015-11-06

NATO’s role in the cyber domain is unclear.

Would NATO go to war in response to a cyber-attack against one of it's members? Opinion By Jamie Collier.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

National Cyber Security Centre (NCSC) - United Kingdom

National Cyber Security Centre (NCSC) - United Kingdom

The NCSC acts as a bridge between industry and government, providing a unified source of advice, guidance and support on cyber security, including the management of cyber security incidents.

Zurich

Zurich

Zurich is a leading multi-line insurer providing a wide range of property and casualty, and life insurance products and services in more than 210 countries and territories.

Leviathan Security Group

Leviathan Security Group

Leviathan provides a broad set of information security services ranging from low-level technical engineering to strategic business consulting.

Sentia

Sentia

Sentia is an IT and infrastructure firm, with focus on Outsourcing, IT operation and management, Hosting, Co-location, Network, and IT security.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

Kasada

Kasada

Kasada has developed a radical approach to defeating automated cyberthreats based on its unmatched understanding of the human minds behind them.

CyberWhite

CyberWhite

CyberWhite is a disruptive provider of cyber security and risk mitigation solutions.

AaDya

AaDya

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses.

Hexaware Technologies

Hexaware Technologies

Hexaware is an automation-led next-generation service provider delivering excellence in IT, BPO and Consulting services.

INE

INE

INE is a premier provider of Technical Training for the IT industry.

Cyber Range Solutions (CRS)

Cyber Range Solutions (CRS)

CRS provides cyber security training and improve security team performance by providing a hyper realistic, virtual training environment.

Bedrock Systems

Bedrock Systems

BedRock Systems is on a mission to deliver a trusted computing base from edge to cloud, where safety and security isn’t just a perception, it’s a formally proven reality.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

Pantherun Technologies

Pantherun Technologies

Pantherun is a pioneering force in the realm of encryption technology and data protection solutions.