News

2019-02-19

Cloud Based Technology For Policing

Cloud-based technology can be an effective tool helping law enforcement modernise work practices and better respond to changing societal issues.

2019-02-18

Children Need A Break

Mobile phones should be banned from the dinner table and bedtimes as part of a healthy approach to devices, says the UK's chief medical officers.

2019-02-15

Unleash Blockchain Into Your Supply Chain

Supply chains are poised for a major disruption because of the evolving potential of blockchain technology to dramatically improve efficiency.

2019-02-15

NASA's Daily Shutdown Threat

NASA faced daily cybe rsecurity threats during the US government's 35-day partial shutdown and these could re-emerge with a new shutdown.

2019-02-13

Cyber Insurance Risks Are Moving Too Fast For Underwriters

With the growing number of inter-connected systems, devices and machines there is no business free from cybersecurity risk.

2019-02-14

Meeting The Cyber Talent Challenge Head-On

What can HR professionals do to lead the recruitment, retention and development of staff in cybersecurity roles?

2019-02-13

Military Cyber Training Methods

It's war between criminal hackers and corporate IT defense systems and when it comes to wars military organisations know how to fight them best.

2019-02-13

White Hat Female Hacker Leads The Way

The CEO of LMG Security is one of a small but powerful group of women rising to the top in the fast-growing cybersecurity industry.

2019-02-11

Dubai Police Hold 2nd Annual Cybersecurity Challenge

Dubai's “Capture the Flag” challenge intends to inspire enthusiasts to learn more about computer science and strengthen problem-solving skills.

2019-02-13

UK Student Loans Company In The Crosshairs

Cyber criminals are using malware, malicious emails and fake calls in attempts to access confidential financial data belonging to students.

2019-02-12

Foreign Hackers Target Canadian Government & Banks

The experts at FireEye say that Canadian banks, mining companies and government institutions are being targeted for IP theft and malware infection.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Agenci

Agenci

Agenci are specialists in cyber security and information security and deliver ISO 27001 Certification.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

Shadowserver Foundation

Shadowserver Foundation

Shadowserver Foundation aims to improve internet security by raising awareness of compromised servers, malicious attackers and the spread of malware.

Future of Cyber Security Europe

Future of Cyber Security Europe

Future of Cyber Security Europe is a European wide event examining the latest cyber security strategies and technologies.

TCN

TCN

TCN is an advanced System Integrator and Infrastructure Company in Albania.

Trusted CI

Trusted CI

Trusted CI, the NSF Cybersecurity Center of Excellence is comprised of cybersecurity experts who have spent decades working with science and engineering communities.

Northcross Group (NCG)

Northcross Group (NCG)

NCG provides services to help organizations meet the challenges of regulatory compliance. Our services include support, consultation, tools and accelerators for all parts of an organization.

Enzoic

Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection.

Apptega

Apptega

Apptega is an award-Winning Cybersecurity and Compliance Platform. Our mission is to make cybersecurity and compliance easy for everyone.

Vantea SMART

Vantea SMART

Vantea SMART have decades of experience in cybersecurity resulting in an approach of proactive prevention - Security by Design and by Default.

Vectra AI

Vectra AI

Vectra threat detection & response - see and stop threats across hybrid and multi-cloud enterprises.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

PureID

PureID

Protect your enterprise with PureAUTH #IAMFirewall, Resilient SSO platform, purpose built to provide Passwordless Authentication & Zero Trust Access, by default.

Cloud & More

Cloud & More

Tired of impersonal IT support? Experience the Cloud & More difference. We offer tailored IT services with a personal touch, ensuring your business technology runs smoothly.

Cloudbox

Cloudbox

Cloudbox build and maintain a highly secure, compliant IT infrastructure for our clients – with total peace of mind – so they can focus on the market.

Noma Security

Noma Security

Noma Security's mission is Application Security for the Entire Data & AI Lifecycle.