News

2018-10-10

Organisations Are Identifying Cyber Threats More Effectively

SANS Threat Research find that most organisations are still reacting to alerts and incidents, instead of proactively them seeking out.

2018-10-03

Reputational Damage & The Human Factor In Social Media

The greatest cybersecurity risk modern businesses currently face comes from people, not from a lack of firewalls or security policies.

2018-10-02

The Image Of Julian Assange Grows Darker

The architect of WikiLeaks depicts himself as an heroic fighter for the cause of transparency, but that image is getting harder to take at face value.

2018-10-02

Tesco Bank Fined £16.4m For Exposing Customers

Let Off Lightly: Tesco Bank has agreed to pay £16.4m as part of a settlement with the Financial Conduct Authority following a cyber-attack in 2016.

2018-10-02

How To Hack the Hackers: The Human Side Of Cybercrime

As cyber-attacks grow more sophisticated, those who defend against them are using behavioural science to understand perpetrators and victims.

2018-10-02

Machine Learning Algorithms & Police Decision-Making

Use of machine learning in police decision-making is in its infancy and the impact of algorithms on police officers’ actions is poorly understood.

2018-10-01

SMEs Risk Costs Of Up To $2.5m Following A Breach

Cisco say that larger organizations tend to be more resilient than SMEs after an attack as they have more resources for response and recovery.

2018-10-01

UK Newspaper Industry Demands Levy On Tech Firms

The British newspaper industry thinks that the government should force social media platforms like Facebook and Google to pay for journalism.

2018-10-01

NATO Can’t Agree On What A Cyber Attack Is

NATO member states have not reached consensus on how to actually count and categorise cyber incidents across the alliance.

2018-10-01

Major Facebook Breach: 50m Users Compromised

An attacker can take full control of the victim’s account, including logging into third-party applications that use Facebook Login.

2018-09-28

US Has Devastating Cyber Weapons

The crippling power of US cyber weapons will be deployed more often as authority for their use is moved further down the chain of command.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IPVanish

IPVanish

IPVanish has its roots in over 15 years of network management, IP services, and content delivery services. Now we're bringing these finely honed skills to VPN.

Centre for Cyber Security (CFCS) - Denmark

Centre for Cyber Security (CFCS) - Denmark

The Centre for Cyber Security is the Danish national IT security authority, Network Security Service and Centre for Excellence within cyber security.

Myra Security

Myra Security

Myra technology monitors, analyzes, and filters malicious internet traffic before virtual attacks can do any real harm.

CTERA Networks

CTERA Networks

CTERA provides cloud storage solutions that enable service providers and enterprises to launch managed storage, backup, file sharing and mobile collaboration services using a single platform.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic's main goal is toward establishing an international reference centre for excellence in the field of digital forensics and data recovery services.

WisePlant

WisePlant

WisePlant's portfolio of solutions and services includes process measurement, secure automation, industrial cybersecurity, functional safety and more.

Privacyware

Privacyware

Privacyware's ThreatSentry combines a state-of-the-art Web Application Firewall and port-level firewall with advanced behavioral filtering to block unwanted IIS traffic and web application threats.

OwnZap Infosec

OwnZap Infosec

OwnZap Infosec aims to digitally shield the cyberspace by offering services like Penetration Testing and Red Teaming, Infrastructure Security Testing, and Vulnerability Assessments.

Infinite Ranges

Infinite Ranges

Infinite Ranges delivers secure, comprehensive digital solutions by connecting experts with the best products and services for the digital age.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

Green Radar

Green Radar

Green Radar is a next generation cybersecurity company which combines technologies and services together to deliver Threat Detection for Emails and Deep Threat Analytics and Response.

Avalon Cyber

Avalon Cyber

Arm your organization in the fight against cyberattacks by partnering with the experts at Avalon Cyber.

Hummingbird International

Hummingbird International

Hummingbird International, LLC offers services for the collection, audit, computer recycling and safe disposal of laptops, monitor/LCD, hard drives, and IT disposal.

Pulsar Security

Pulsar Security

Pulsar Security is a team of highly skilled, offensive cybersecurity professionals with the industry's most esteemed credentials and advanced real-world experience.

Consortium

Consortium

Consortium goes beyond products and promises by working with enterprises to identify, acquire, and deploy cybersecurity solutions that matter.