News

2018-04-30

Six Steps to Protect Customer Data

Data abuse and mishandling can have grave consequences. The Internet Society has six recommendations to promote trust among users.

2018-04-07

GDPR Countdown

When did your company become aware of the General Data Protection Regulation and the need to do something about it?

2018-04-30

AI And Blockchain In A Disruptive World

AI and blockchain enable a big threat from decentralisation but also create enormous opportunities for businesses to advantage from.

2018-04-04

Police Arrest Bank Hacker Who Stole $1B

The leader of the gang behind Carbanak and Cobalt malware who attacked over 100 financial institutions worldwide has been arrested.

2018-04-27

IBM Watson AI Assistant Can Now Work With Autonomous Devices

IBM’s Watson is introducing Watson Assistant, designed to “help bridge the information and data sharing gap between people and things.”

2018-04-18

Regulation Might Actually Protect Facebook

Regulation might actually protect Facebook from competitors. Breakup, not regulation, is the threat that Mark Zuckerberg really fears.

2018-04-20

Russian Bots Promote Fake News

Thousands of suspected pro-Russia robotic accounts producing bogus web messages about the UK nerve agent attack must be confronted.

2018-04-24

Canadian Police Uncover Dark Net Gun Market

Police around the world are not really addressing crime of the Dark Net, but in Canada the Mounties are focused on hunting for illicit guns.

2018-04-18

What Does GDPR Mean For the Retail Industry?

Retailers collect masses of personal data from customers/client emails and payment details. All shortly to be subject to GDPR. By Alfred Rolington

2018-04-18

Human vs Machine Attack Response

Machine automation gives attackers the ability to quickly scale up attacks far beyond human capacity. But automation has its limits.

2018-04-17

Death by Robot

As the use of autonomous machines increases in society, so too has the chance of robot-related fatalities.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Tripwire

Tripwire

Tripwire are a leading provider of risk-based security, compliance and vulnerability management solutions.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

Cyber Seguridad (Cyberseg)

Cyber Seguridad (Cyberseg)

Cyberseg provides specialized Cybersecurity services, including managed services (SOC / CERTs) and solutions for the protection of critical infrastructures.

AVL Mobile Security

AVL Mobile Security

AVL Mobile Security is a market-leading mobile security company for anti-virus and threat intelligence in the mobile Internet.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

Aspen Insurance

Aspen Insurance

Aspen is a leading diversified specialty insurance and reinsurance company. Products offered include cyber insurance.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

Idaptive

Idaptive

Idaptive delivers Next-Gen Access through a zero trust approach. Idaptive secures access everywhere with single sign-on, adaptive MFA, EMM and analytics.

Titans24

Titans24

Titans24 is a Software-as-a-Service security platform for web applications. It prevents attacks on business websites that are protected under 11 cyber-security layers.

DTS Systeme

DTS Systeme

DTS Systeme is an IT service provider with a focus on the core areas of datacenter, technologies and IT security.

Searchlight Cyber

Searchlight Cyber

Searchlight Cyber is a leading darknet intelligence company. Working with law enforcement, industry, and end users to help protect society against the threats of the darknet.

McKinsey & Company

McKinsey & Company

McKinsey & Company is a global management consulting firm. We are trusted advisor to the world's leading businesses, governments, and institutions.

Certcube Labs

Certcube Labs

Certcube Labs provide a broad range of services in the areas of Assessments, Development, Risk Advisory, Blockchain, Forensics Investigations, Managed Security Solutions, and IT Security Trainings.

RIIG Technology

RIIG Technology

Our mission is to empower organizations with high-quality, verifiable data and advanced intelligence solutions, ensuring robust security and effective risk management.

Leapfrog Services

Leapfrog Services

Leapfrog offers outsourced managed IT + cybersecurity services that are scalable, aligned, and fit easily into your business model.