News

2017-12-13

10 Things About The Network and Information Security Directive (NIS)

Ready for GDPR? Here comes the EU Network and Information Security (NIS) Directive, with profound consequences for those to whom it applies.

2017-12-13

Attacks On UK Critical Infrastructure Will Double

Critical infrastructure systems in Britain are becoming more vulnerable at the same time as there is a growing shortage of security analysts.

2017-12-12

Cisco & INTERPOL: Working Against Cybercrime

INTERPOL and IT giant Cisco agree to share data for quick threat detection worldwide and prepare for potential future collaboration in training.

2017-12-12

Bitcoin: UK And EU Will Crackdown On Crime & Tax Evasion.

Traders will have to disclose their identities, ending the anonymity that has made the currency attractive for drug dealing & other illegal activities.

2017-12-11

Russia Is Providing North Korea With Internet Connectivity

By supplying North Korean hackers with added bandwidth and improved capability Russia is promoting even more destructive cyber attacks.

2017-12-11

The Promise & Peril Of Trump’s Cyber Strategy

The Trump administration seems to be stepping back from the historic role of the USA in shaping & enforcing international rules in cyberspace.

2017-12-08

Australia To Challenge Facebook & Google Over Media Disruption

Australian media companies are being squeezed hard as advertising dollars follow eyeballs to the giant US digital distribution platforms.

2017-12-08

Mercenary Hackers Funded By Nation-States

The FBI say they cannot tell the difference between hackers motivated by criminal intent from state- sponsored hackers pursuing cyberwar.

2017-12-08

Fake News & Botnets: Russia Has Weaponised The Web

The core concept of cyberwar is psychological manipulation, executed with targeted digital disinformation to weaken a country from within.

2017-12-06

More Businesses Could Use Machine Learning

Few fields promise to “disrupt” life as we know it quite like machine learning, but many applications of machine learning technology go unseen.

2017-12-06

North Koreans Study Bitcoin

Pyongyang University, considered the breeding ground for N. Korea’s army of hackers, is now offering courses on crypto-currencies.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

OneLogin

OneLogin

OneLogin simplifies identity management with secure, one-click access,for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications.

Illumio

Illumio

Illumio delivers adaptive security for every computing environment, protecting the 80% of data center and cloud traffic missed by the perimeter.

Morphisec

Morphisec

Morphisec's world leading prevention-first software stops ransomware and other advanced attacks from endpoint to the cloud.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

Selectron Systems

Selectron Systems

Selectron offers system solutions for automation in rail vehicles and support in dealing with your railway cyber security challenges.

Digital Identification & Authentication Council of Canada (DIACC)

Digital Identification & Authentication Council of Canada (DIACC)

DIACC is a non-profit coalition of public and private sector leaders committed to developing a Canadian framework for digital identification and authentication.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

Cyber Resilience Centre for Wales (WCRC)

Cyber Resilience Centre for Wales (WCRC)

The Cyber Resilience Centre for Wales (WCRC) is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

Clearvision

Clearvision

As an Atlassian Platinum Solution Partner, Clearvision works with teams in the UK and US, providing solutions for the Atlassian stack, Git and open source tooling.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

FoxPointe Solutions

FoxPointe Solutions

FoxPointe Solutions is a full-service cyber risk management and compliance firm.

CallCabinet

CallCabinet

CallCabinet is the premier cross-platform SaaS provider for end-to-end compliant call recording, AI-driven conversation analytics, call QA, and custom business intelligence reporting.

SECUREU

SECUREU

At SECUREU, we protect growing businesses against cyberattacks by proactively implementing best security practices, fixing existing security vulnerabilities, and increasing cyber awareness.

SGNL

SGNL

SGNL redefines identity-first security by integrating business context, closing critical gaps, and transforming how enterprises manage privileged access for a secure, adaptive future.