News

2018-04-12

AI Won’t Replace The Human Brain

Startup Nectome thinks it is possible to create a map of all of the brain's neuron connections, a "connectome", to make an artificial reconstruction.

2018-04-12

How to Access the Dark Web Anonymously

Are you trying to find out how to access the dark web? You will need an anoymising browser, but its unreliable, slow and you might not like it.

2018-04-11

Cambridge Analytica, Facebook & GDPR

The UK Information Commissioner has her work cut out deciding if there has been any illegality in her jurisdiction. Would it be different after GDPR?

2018-04-11

Criminal Web-Injects Can Steal Cryptocurrency

Criminals are deploying a variety of tactics to try and profit from the cryptocurrency boom, including web-injects to intercept & modify web traffic.

2018-04-11

The Cloud Is A Key To Cyber Defence

Organisations need to grasp security intelligence and act on it faster to get ahead of attackers. Cloud-based security can make that possible.

2018-04-10

Denmark: A Leader In Cyber Security

Denmark is amongst the countries that suffer from lowest numbers of cyber attacks, despite being a highly digitised nation.

2018-04-04

Europol Chief Moves to Deloitte

Exec.Director Rob Wainwright is leaving the EU police intelligence agency to run Deloitte’s cybersecurity practice.

2018-04-10

Cyber Terrorism Will Be A Top Threat By 2020

Nation-state sponsored cyber terrorism will be a top threat by 2020 and those organisations incapable of responding quickly will crumble.

2018-04-10

Iranian Hackers Adopt New Methods

An Iranian espionage group has been using new malware and data exfiltration techniques in recent attacks, say the experts at Nyotron.

2018-04-09

Home Working Is A Threat To Cybersecurity

Forget About BYOD: Chartity sector workers should avoid taking work devices and sensitive work information home with them.

2018-04-09

Fake News Will Lead To A Cyber War

When people start to believe everything they read, it makes the world a very unpredictable place. In the real world, fake news is a form of cyber attack.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

SCADAhacker

SCADAhacker

SCADAhacker provides mission critical information relating to industrial security of SCADA, DCS and other Industrial Control Systems.

Foundation Futuristic Technologies (FFT)

Foundation Futuristic Technologies (FFT)

FFT is a global leader in computer forensics and digital investigation solutions.

OnSystem Logic

OnSystem Logic

OnSystem Logic has developed a unique, patent-pending solution to solve the problem of the exploitation of flaws in application software as a technique for cyber attacks.

CyberSaint Security

CyberSaint Security

CyberSaint’s CyberStrong Platform empowers organizations to implement automated, intelligent cybersecurity compliance and risk management.

Aujus Cybersecurity

Aujus Cybersecurity

Aujas is a pure-play cyber security services company with deep expertise in Identity and Access Management, Managed Security and Security Testing services.

Syndis

Syndis

Syndis is a leading information security company helping to defend organizations by providing bespoke services and innovative security solutions in the global market.

SystemExperts

SystemExperts

SystemExperts is a premier provider of IT compliance and cyber security consulting services.

SOC Prime

SOC Prime

SOC Prime is the only Threat Detection Marketplace where researchers monetize their content to help security teams defend against attacks easier, faster and more efficiently than ever.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.

Tentacle

Tentacle

Tentacle has developed a configurable data management tool that helps organizations to improve their information security programs and overall security posture.

CDS

CDS

CDS is a strategic change agency enabling organisations and businesses to create and build better services to meet the evolving needs of customers, employees and citizens.

Ermes

Ermes

Ermes – Intelligent Web Protection provides companies with a solution that effectively secures them against web threats.

Cyclops

Cyclops

Cyclops is the first Contextual Search Platform for cybersecurity.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.

Securily

Securily

Securily offers the ultimate solution for small to medium-sized businesses, blending cutting-edge AI with expert human insight to deliver the world’s easiest and most effective pentesting experience.

Claratti

Claratti

Clarrati are a team of innovators. Industry leaders in the cloud computing, remote working, and work-from-home space. We partner with you to empower your business for the future.