News

2018-07-11

EU Creates A Unified Cyber-Force

EU member states have agreed to create “EU Cyber Rapid Response Force” teams and is enlisting support from all member states.

2018-07-11

ICO Fine Facebook Half A Million Pounds

Facebook is to be fined £500,000 by the British ICO regulator, the maximum amount possible, for its part in the Cambridge Analytica scandal.

2018-07-10

California Passes Its Own GDPR Law

California's 40m residents get the right to view the data companies hold on them, make corrections and request that it not be sold to third parties.

2018-07-10

Five Tips To Secure IoT

To make the most of empowering IoT technology, it must be simultaneously optimised to do its job while not exposing personal data.

2018-07-10

Police Criticised For Face Recognition Failures

Face recognition is contentious because of issues of privacy and race. Some experts are saying face recognition software is not ready for Police use.

2018-07-09

Russia Faces US Request To Extradite Snowden

Donald Trump is expected to ask for Edwards Snowden's return to the US to face trial when he meets Vladimir Putin next week.

2018-07-09

Blockchain For US Border Security

DHS want to combine blockchain technology with US border sensors and cameras to protect the integrity of data collected by IoT devices.

2018-07-09

Crypto-Mining For Cyber Criminals

Malicious crypto-mining malware is becoming a top tactic among cyber criminals according to WatchGuard Security's Q1 threat intelligence update.

2018-07-07

Cybercrime & Terrorism Threaten South Africa

S Africa needs more advanced gadgets to detect early danger signals and its intelligence service needs more well-trained agents in the field.

2018-07-09

China Escalates Hacks On The US

Submarines, Satellites & More. China's nation state hackers have reorganized and retooled to become even more effective at digital espionage.

2018-07-06

Theft & Subsequent Re-Use of Cyber Weapons

A year has passed since two widespread and very destructive attacks, both using offensive cyber tools created by the NSA and then stolen.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

NISC was established as a secretariat of the Cybersecurity Strategy Headquarters in collaboration with the public and private sectors to create a "free, fair and secure cyberspace" in Japan.

IronScales

IronScales

IronScales combines human intelligence with machine learning to automatically prevent, detect and respond to email phishing attacks.

Holm Security

Holm Security

Holm Security are taking vulnerability assessment into the next generation as a cloud service.

DG Technology

DG Technology

DG Technology is a customer-centric technology expert and business consultant that delivers services and products to minimize your information security, compliance, and business risks.

Swimlane

Swimlane

Swimlane is a leader in security automation and orchestration (SAO). Our platform empowers organizations to manage, respond and neutralize cyber threats with adaptability, efficiency and speed.

Infortec

Infortec

Infortec provide consultancy and solutions for the protection of digital information and the management of computer resources.

TOAE Security

TOAE Security

TOAE Security is a trusted cyber security consulting partner helping today's leading organizations protect their most important assets from evolving cyber threats.

IberLayer

IberLayer

IberLayer is the company behind the Email Guardian service, a cloud based Email Total Protection system that filters and blocks email threats.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

Finosec

Finosec

Finosec's mission is to change the way information security and cybersecurity are managed in banking.

SafeTech Informatics & Consulting

SafeTech Informatics & Consulting

Safetech's OTShield detects, prevents and analyses cyber-attacks in SCADA and Industrial IoT systems by utilising state of the art deception techniques.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

Cyberplc

Cyberplc

Cyberplc is a global cybersecurity consulting firm providing services to government, the public sector and enterprises.

JanBask Training

JanBask Training

JanBask Training is a dynamic, highly professional, global online training provider committed to propelling the next generation of technology learners with a whole new way of training experience.

Board of Cyber

Board of Cyber

Board of Cyber offers Security Rating: a fast, non-intrusive, continuous, 100% automated solution to evaluate the cyber performance of an organization.