News

2017-12-19

96 Hours To Pay Up Or Spider Ransomware Deletes Your Files

To avoid the Spider Virus Windows users should be cautious of encrypted documents that contain a message enabling macros.

2017-12-18

Russia Will Build A Separate Internet Directory

The Russian government plans to build an “independent internet” for BRIC nations as an alternative to the global Domain Name System .

2017-12-18

Undersea Telecoms Cables Are Interception Targets

Undersea cables carrying vital data are essential to modern communications but lack both physical and legal protections. That's a problem.

2017-12-15

Cyber Criminals Are The New Mafia

New participants have transformed cybercrime from isolated, individual acts into pervasive, savage practices run by distinct groups.

2017-12-15

MH370 Loss Could Have Been A Remote Skyjacking

It emerges that the missing aircraft was fitted with a post 9/11 'uninterruptible' autopilot system capable of being hacked & remotely controlled.

2017-12-14

German Spies Warn Of Chinese Espionage

The German domestic intelligence agency (BfV) has detected fake LinkedIn profiles from China being used to recruit high level informants.

2017-12-15

ISIS Warns Of Imminent Cyber Attacks On The US

Losing on the ground, ISIS has renewed its threats to 'penetrate' websites including government and military, identifying America as the target.

2018-01-26

The GDPR Advisory Board Offers Expert Advice

The GDPR Advisory Board is an accessible platform for organisations baffled by the implications of the General Data Protection Regulation.

2017-12-14

Botnets Are Here To Stay

Botnets work by infecting connected devices with malware, then managing them using a command and control server. The results can be devastating.

2017-12-14

Bitcoin Exchanges Under Siege

Three out of four Bitcoin exchanges and related cryptocurrency sites have suffered a DDoS attack in the third quarter of 2017.

2017-12-14

British Banks Are Hiding Cyber Attacks

Coverup: The UK Financial regulator suspects "material under-reporting of successful cyber-attacks" on banks and other financial institutions.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

Rubicon Workflow Solutions

Rubicon Workflow Solutions

Rubicon is a leading provider of managed IT support and strategic services, specialising in creative and mixed platform environments.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

Eseye

Eseye

Eseye is a global specialist supplier of cellular internet connectivity for intelligent IoT (Internet of Things) devices.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

Avertro

Avertro

Avertro helps leaders manage the business of cyber. We help explain cybersecurity to executives, forecasting outcomes, right-sizing your spend, and validating your cyber strategy.

Prosperoware

Prosperoware

Prosperoware develop software for cybersecurity, privacy, and regulatory compliance for content systems, and financial matter management.

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

ITSEC Asia

ITSEC Asia

ITSEC Asia works to effectively reduce exposure to information security threats and improve the effectiveness of its clients' information security management systems.

Cisilion

Cisilion

Cisilion's mission is simple – to transform and connect business with next-generation IT infrastructure. Our expertise includes enterprise networking, security, data centre & cloud, managed services.

Paramount Defenses

Paramount Defenses

Paramount Defenses have unrivaled capability in two of the most critical areas in cyber security today – Active Directory Security and Privileged Access.

XBOW

XBOW

XBOW brings AI to offensive security, augmenting the work of bug hunters and security researchers.

Rankiteo

Rankiteo

At Rankiteo, we are pioneers in cybersecurity risk management. Our mission is to empower organizations with the tools they need to assess, enhance, and safeguard their digital landscapes.