News

2018-11-02

Pay-As-You-Go Cybersecurity

Shifting from a monolithic, high investment, capex-based cybersecurity model to an on-demand, pay-as-you-go one is clearly the way of the future.

2018-11-07

Blockchain May Break Tech’s Hold On AI

Hot Money: The idea of applying the blockchain to artificial intelligence is attracting a growing number of serious entrepreneurs and VCs.

2018-11-03

Younger Generation Better At Separating News From Opinion

Gen Z don’t know much about the days of print newspapers separating the news pages from the opinion section. But they can tell the difference.

2018-11-09

USA & China Named As Top Cyber-Attack Sources

Of 27 million attack sources analysed by NSFOCUS in H1 2018, attacks emanating from China, the USA & Russia were predominant.

2018-11-07

Finland Is Worried About Russian Cyberwar Techniques

Falling in the shadow of its giant neighbour means that Finland is being  inevitably drawn into the world of Russian hybrid warfare.

2018-11-12

British Army Gets a New Robot

The British Army has a new ordnance disposal robot with the ability to climb stairs and negotiate slopes of more than 40 deg. to defuse bombs.

2018-11-04

Plans to Create More Cyber Women

Kaspersky Lab has developed new partnerships in an effort to encourage more women to consider careers in the cyber security field.

2018-11-08

How Cybersecurity Threats Are Growing Investments

Viruses, worms, firewalls, Trojans, ransomware: Investors are searching for ways to capitalise on the growth of the cybersecurity sector.

2018-11-02

Cyber Audits: The Missing Layer in Cybersecurity

Involving the audit team ensures that technology solutions are being properly deployed to address critical strategic security risks.

2018-11-01

Machine Learning & Big Data - Where You Least Expect It

Machine Learning has gone from a cryptic domain understood by a few to a technology that every company must deploy. Likewise Big Data.

2018-10-31

North Korea Is Using The Internet Like The Mafia

North Korea has “dramatically” changed its Internet use patterns, as Kim Jong Un directs hacking operations ‘like a Criminal Syndicate’.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NCX Group

NCX Group

NCX Group is committed to helping customers identify and mitigate the risks inherent in today’s interconnected environments and business processes.

Paessler

Paessler

Paessler is a leading worldwide provider of network monitoring software.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

Mitol PerfectBackup

Mitol PerfectBackup

Mitol PerfectBackup provide Enterprise Online Backup, Disaster Recovery and Cloud Computing Services.

IoT Security Foundation (IoTSF)

IoT Security Foundation (IoTSF)

IoTSF is a collaborative, non-profit organisation with a mission to raise the quality and drive pervasive security in the Internet of Things.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

Centurion Information Security

Centurion Information Security

Centurion Information Security is a consulting firm based in Singapore that specialises in penetration testing and security assessment services.

Evidence Talks (ETL)

Evidence Talks (ETL)

A leading forensic computing authority developing unique digital forensic technologies. Tools that detect potential terrorists & criminals & used by the military, enforcement & intelligence commmunity

CERT Tonga

CERT Tonga

CERT Tonga is the national Computer Emergency Response Team for Tonga.

DeepCyber

DeepCyber

DeepCyber supports its customers, with an “intelligence-driven” approach, to improve their proactive detection and response "capability" of cyber threats.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

Cord3

Cord3

Cord3 delivers data protection, even from trusted administrators – or hackers posing as administrators – with high privilege.

Salem Cyber

Salem Cyber

Salem Cyber builds Artificial Intelligence (AI) solutions that work collaboratively with people to address scalability challenges in cybersecurity operations.

TPx Communications

TPx Communications

TPx is a leading managed services provider offering a full suite of managed IT, unified communications, network connectivity and security services.

Secora Consulting

Secora Consulting

Secora Consulting is a professional services company specialising in tailored cybersecurity assessments and cyber advisory services.

Effectiv

Effectiv

Effectiv is a real-time fraud & risk management platform for Financial Institutions and Fintechs.