News

2019-03-28

Over 90% Of Security Pros Fear Insider Threats

The vast majority of IT and security professionals surveyed said they feel vulnerable to insider threats, either malicious or accidental.

2019-03-28

"Cookie Walls" Non-Compliant With GDPR

The Dutch Data Protection Agency says "cookie walls" that demand a website visitor agrees to being tracked are not compliant with EU law.

2019-03-29

Where On Earth Is Cloud Data Actually Stored?

Many people don’t realise that despite being held in the “cloud”, your data still needs to be physically stored on a device somewhere.

2019-03-27

NASA’s Poor Cybersecurity Is An Operational Threat

Serious deficiencies in NASA’s information security program include inaccurate data in system security plans and delays in control assessments.

2019-03-27

What's The Difference Between AI And Machine Learning?

Artificial intelligence and machine learning are often lumped together and its easy for people to mistake them as synonymous. They are not.

2019-03-26

LinkedIn Used As The Vehicle For A Global Scam

The experts at Digital Shadows have highlighted how the leading social media platform for business professionals can be used illegally for extortion.

2019-03-26

US Cyber Command Can Cut Russian Troll Access

A US military agency successfully blocked the Internet access of a Russian firm believed to be trying to influence the 2018 US midterm elections.

2019-03-26

Cyber Criminals Are Changing Their Methods

Increased security measures and awareness are driving cyber-criminals to alter their techniques in search of a better return on investment.

2019-03-26

US Surveillance System Exposed By Snowden Goes Dormant

A US surveillance programme whose forerunner was exposed by Edward Snowden has not been used for six months and is unlikely to be renewed.

2019-03-25

Half Of UK Businesses Have Fallen For Phishing Attacks

Phishing emails are a common attack technique deployed in hacking campaigns which attempt to lure victims into disclosing sensitive information.

2019-03-25

Three In Five Politicians’ Websites Don’t Use Cyber Security

A wide survey of politicians' websites across 37 countries finds that over 60% lack basic security measures.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

JYVSECTEC - JAMK University of Applied Sciences

JYVSECTEC - JAMK University of Applied Sciences

JYVSECTEC is a cyber security research and development and training centre

IEEE Computer Society

IEEE Computer Society

The IEEE Computer Society is the world's leading membership organization dedicated to computer science and technology.

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

Altron

Altron

Altron provides locally relevant innovative and integrated ICT solutions to business, government and consumers.

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference is a non-profit, annual, information security conference located in Halifax, Nova Scotia, Canada.

Dcode

Dcode

Dcode connects the tech industry and government to drive commercial innovation in the federal market.

Ridge Global

Ridge Global

Ridge Global works with C-suite executives and corporate directors to build more resilient organizations through innovative preparedness, protection, response and education capabilities.

Octo

Octo

Octo, an IBM company, is a technology firm dedicated to solving the Federal Government’s most complex challenges, enabling agencies to jump the technology curve.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

Liquis Inc.

Liquis Inc.

Liquis, founded in 2002, is one of the largest facility decommissioning services companies in the U.S.

CYBRI

CYBRI

CYBRI is a cybersecurity company helping businesses detect and remediate mission-critical vulnerabilities before they get exploited by hackers.

Cyber Unicorns

Cyber Unicorns

Cyber Unicorns is a cyber security consultancy created to help drive cyber security outcomes in the small to medium-sized business space.

ModelOp

ModelOp

ModelOp is the leading AI Governance software for enterprises and helps safeguard all AI initiatives.