News

2018-10-24

Tackling UK Cyber Crime

Cyber crime has overtaken physical theft as the most common criminal offence in the UK and criminals find online theft is safer than burglary.

2018-10-23

A Genocide Incited On Facebook

Myanmar military personnel turned the social network into a tool for ethnic cleansing hidden behind fake names and sham accounts.

2018-10-22

35 Million 2018 US Voter Records For Sale

Current voter registration data found for sale on a hacking forum, includes full name, phone numbers, physical addresses & voting history.

2018-10-23

How Cyber Criminals Are Using Social Media To Hack Bank Accounts

Criminals use social media to check when customers are contacting banks about problems to then pose as the bank to hack people's data.

2018-10-23

China Is 'biggest state sponsor of Cyber-Attacks on the West'

China, not Russia, has become the biggest state sponsor of cyber-attacks in its bid to steal commercial secrets, according to Crowdstrike.

2018-10-18

British National Cyber-Centre Thwarts Hostile Hackers

The NCSC say it is defeating about 10 attacks every week, mostly carried out by state-sponsored hackers employed by hostile nations.

2018-10-17

British MoD Secrets Exposed In Dozens Of Breaches

Revealed: The Ministry of Defence and its partners failed to protect military and defence data in 37 cybersecurity incidents in 2017.

2018-10-19

It's Time To Embrace Blockchain Technology

It’s time for your business to start embracing blockchain, the biggest game-changer in technology since the Internet.

2018-10-22

Guide To All Things Criminal On The Web

An overview of the common kinds of cybercrime, with real-world examples and suggestions for tools you can use to protect yourself.

2018-10-18

Mobile Security Threats Put Businesses At Risk

A significant lack of visibility into non-corporate devices and networks is putting businesses at risk of data leakage and phishing attacks.

2018-10-17

Cyberwars Heat Up In AsiaPac To Battle Chinese Aggression

Governments in the Asia-Pacific region are strengthening their offensive capabilities in the fight against Chinese cyberwarfare.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

UpGuard

UpGuard

UpGuard's discovery engine brings visibility to complex IT environments, enabling teams to identify risk, confirm compliance and make business safer.

APrivacy

APrivacy

APrivacy provides information and communication security products for the financial services industry.

idappcom

idappcom

idappcom provides unique industry approved software solutions for auditing and enhancing the threat recognition and response capabilities of your corporate security defences.

Arete

Arete

Arete is a global cyber risk company whose mission is to transform the way organizations prepare for, respond to, and prevent cybercrime.

CARICERT

CARICERT

CARICERT is the National Cyber Emergency Response Team of Curacao in the Caribbean.

Cybersecurity Tech Accord

Cybersecurity Tech Accord

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Kapalya

Kapalya

Kapalya empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application.

Highland Capital Partners

Highland Capital Partners

Highland Capital Partners is an early stage venture capital firm focused on category-defining businesses in consumer and enterprise technology, including cybersecurity.

Center for Information Technology Policy (CITP) - Princeton University

Center for Information Technology Policy (CITP) - Princeton University

The Center for Information Technology Policy at Princeton University is a nexus of expertise in technology, engineering, public policy, and the social sciences.

CliftonLarsonAllen (CLA)

CliftonLarsonAllen (CLA)

CLA exists to create opportunities for our clients through industry-focused advisory, outsourcing, audit, tax, and consulting services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.

ViCyber

ViCyber

ViCyber is an Australian based company whose mission is to simplify and strengthen cybersecurity for all businesses, irrespective of size.

Transcendental Technologies

Transcendental Technologies

Transcendental is a consulting organization which specializes in customized assurance services in the fields of Localization, Mobile Software Solutions, Web Design, Cyber Security & Cyber Forensics.

Servadus

Servadus

Servadus help organizations with their cybersecurity and compliance programs through management and sustainability, consulting, and assessing.