News

2018-07-17

Cybersecurity Awareness & Compliance Training – That’s Bob’s Business

A company specialising in cybersecurity awareness that helps organisations become GDPR compliant has won a Royal Competition.

2018-07-20

Android Abuse: EU Fines Google $5.1 Billion

The EU is taking aggressive regulatory action against the US technology giant that may cause lasting changes to the smartphone industry.

2018-07-24

Quantum Computing Is Becoming Reality

The first thing to know about quantum computing is that it won’t displace traditional, or ‘classical’ computing…Yet…

2018-08-08

Crypto-Mining Hits 42% Of Organisations Worlwide

Criminals are using cloud infrastructure to target organisations with crypto-mining malware to develop illegal revenue streams.

2018-08-08

EU Cybersecurity Act Could Impact Cross-Border Data Flows

The proposed EU Cybersecurity Act would create a single certification scheme for ICT and place IoT device manufacturers under major pressure.

2018-08-07

Hackers Paid Big Money To Improve Cybersecurity

Hackers are being paid big bounties by business and government agencies to discover bugs and to protect platforms, products and consumers.

2018-08-07

Business Will Benefit From Artificial Intelligence

AI will rapidly gain traction in these three critical areas of business: Decision Support, Equipment Maintenance and Customer Contact.

2018-08-01

Israel Wants Collaborators For Defence

Israel is looking to collaborate with other countries including India to develop state-level cyber shields via the Israel National Cyber Directorate.

2018-08-03

Robots Will Invade The Workplace

"The spread of computers ... will put jobs in two categories. People who tell computers what to do, and people who are told by computers what to do."

2018-08-01

UK Business Is Overconfident About Cybersecurity

75% of executives say their company is better prepared than competitors, up from 60% a year ago and 43% said their firm was a top performer.

2018-07-25

Chinese Hackers Target Cambodian Elections

Chinese spies are targeting Cambodian government institutions, opposition party members & media in advance of national elections.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

Applicure Technologies

Applicure Technologies

Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.

Surrey Centre for Cyber Security (SCCS)

Surrey Centre for Cyber Security (SCCS)

The Centre focuses on three main research directions - Privacy and Data Protection, Secure Communications, and Human-Centred Security.

Glasswall Solutions

Glasswall Solutions

Glasswall Solutions has developed a disruptive, innovative security technology which provides unique protection against document based cyber threats.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

LATRO Services

LATRO Services

LATRO Services is a complete solution provider to discover, locate, and eliminate telecom fraud.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

JobStreet.com

JobStreet.com

JobStreet is one of Asia’s leading online employment marketplaces in Malaysia, Philippines, Singapore, Indonesia and Vietnam.

e360

e360

e360 (formerly Entisys360) is an award-winning IT consultancy specializing in advanced IT infrastructure, virtualization, security, automation and cloud first solutions.

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

Mitiga

Mitiga

Mitiga uniquily combines the top cybersecurity minds in Incident Readiness and Response with a cloud-based platform for cloud and hybrid environments.

Nclose

Nclose

Nclose is a proudly South African cyber security specialist that has been securing leading enterprises and building our security portfolio since 2006.

SecureChain AI

SecureChain AI

SecureChain are combining blockchain and AI technology to create a smarter blockchain platform especially in terms of security.

NetHope

NetHope

NetHope is a membership-based organization serving the international nonprofit humanitarian, development, and conservation sector through digital transformation.

OOKOS

OOKOS

OOKOS was founded in 2023 by a team of cybersecurity veterans who recognized that traditional security models were failing to keep pace with evolving threats.

Cyver Core

Cyver Core

Cyver Core is a pentest management and pentest report automation platform that consolidates cybersecurity work, automates overhead, and frees cybersecurity professionals up for the work that matters.