News

2018-06-20

How To Use AI & Predictive Analytics

Anticipate and prevent storage infrastructure problems by combining flash storage with cutting-edge predictive technology.

2018-06-20

Zambia Wants Tough New Online Regulations

Like some other African states, Zambia plans new laws governing online behaviour with severe penalties and a new Cybersecurity Agency.

2018-06-20

Five Mistakes US Cyberscurity Vendors Make In The UK

Despite the similarities, many vendors fall at the first hurdle by failing to account for some important differences in the UK market.

2018-06-19

Trump / Kim Summit Attracts A Heavy Wave of Cyber Attacks

Cyberattacks targeting Singapore skyrocketed during the Trump / Kim summit meeting, with 88% originating from Russia.

2018-06-19

Deloitte To Invest £430 Million On Cybersecurity Defences

The leading cybersecurity consulting firm has been embarrassed by recent breaches and plans to make a big investment in expanding its services.

2018-06-19

British Universities Have Many Cyber Threats

IT security is not a new challenge for universities but with GDPR it is expected that universities will become more strictly liable for data breaches.

2018-06-19

Business AI Platform For Commercial Development

Some say that tackling business uncertainty can be greatly assisted by artificial intelligence, but it is a many-layered and complex process.

2018-06-18

How Computer Data Helped Investigate Quebec Shooter

The criminal proceedings against Quebec's mosque shooter provided insight on police use of computers to extract information about a suspect.

2018-06-19

Cryptocurrency Malware Theft Is Worth Millions

The market for malware and tools designed specifically for the theft of cryptocurrency is booming with $1.1 billion stolen this year.

2018-06-18

Profile Of An Ethical Bug Hunter

Ethical hacking has moved on from academic researchers and lone wolf hackers and has become a big business, in the form of bug hunting.

2018-06-18

Israeli Cybersecurity Company Beats All Hackers

In a special challenge to hackers Cyber 2.0 offered a cash prize for any hacker able to penetrate the company's online defences.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Conscio Technologies

Conscio Technologies

Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.

Siepel

Siepel

Siepel manufactures high quality shielded rooms and anechoic chambers dedicated to TEMPEST, NEMP & HIRF.

7Safe

7Safe

7Safe has been delivering hands-on digital security training courses since 2001 and offer e a portfolio of university and industry-accredited courses.

International Federation of Robotics (IFR)

International Federation of Robotics (IFR)

The International Federation of Robotics connects the world of robotics around the globe. Our members come from the robotics industry, industry associations and research & development institutes.

StationX

StationX

StationX is a leading provider of cyber security training, consultancy and services.

Cyber Observer

Cyber Observer

Cyber Observer’s team specializes in providing corporate officers with comprehensive, visual, real-time performance overview, critical security control (CSC) analysis.

NSO Group

NSO Group

NSO Group develops technology that enables government intelligence and law enforcement agencies to prevent and investigate terrorism and crime.

eCosCentric

eCosCentric

eCosCentric provides software development solutions for the IoT, M2M & embedded systems market.

DigiSec360

DigiSec360

DigiSec360 is a technology firm focused on the human element of cybersecurity.

Collins Aerospace

Collins Aerospace

Collins Aerospace provides cybersecurity services and systems to protect critical infrastructure facilities and railroad operations.

Responsible Cyber

Responsible Cyber

Protect yourself with Responsible Cyber’s 360° platform, IMMUNE, arming you with comprehensive support for your business.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

Blink Ops

Blink Ops

Blink helps security teams streamline everyday workflows and protect your organization better.

FusionAuth

FusionAuth

FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome.

Oxylabs

Oxylabs

Oxylabs is the largest datacenter proxy pool in the market, with over 2 million proxies. Designed for high-traffic, fast web data gathering while ensuring superior performance.