News

2017-12-04

Poor North Korea Is A Cyber Superpower

North Korea may be poor, but has proved its destructive powers and is successfully engaged in a full scale cyberwar with South Korea and the US.

2017-11-30

Where Should The Pentagon Focus In Cyberspace?

Playing Catch-Up: The US military is still working out its tactics, techniques, command structures and procedures for operations in cyberspace.

2017-11-24

US Ready To Fight Hybrid War By 2030

The US Army expects lethal attacks in multiple domains, land, sea, air, space and cyberspace, blurring the distinction between peace and war.

2017-11-21

Cyber Security Insurance

It used to be simple …If your employee stole cash from your business or forged a cheque, an insurance policy would cover it. Not any more.

2017-11-20

North Korean Cyber Gangs Blitz the Irish

North Korean state-sponsored cyber gangs are launching almost daily attacks on Irish companies, banks and utilities.

2017-11-28

Social Media & Crisis Management

Social media has the power to connect people instantly. For security managers, it's the most powerful tool for controlling information.

2017-11-15

What Does The UK’s Data Protection Bill Mean For Business?

The UK has published the final version of a law to replace its current data security and privacy rules. What does this mean for business after Brexit?

2017-11-20

Thomson Reuters Create A Knowledge Meta-Graph

A new financial services tool charting over 2 billion connections between people, organisations & metadata within the financial ecosystem.

2017-11-27

Cyber Defense Is All About Political Decisions

One of the things democracies are least prepared to handle about a cyberattack is how quickly the response to it turns in to a political controversy.

2017-11-08

Maritime Cybersecurity: No Substitute for Testing

Preparedness, in the form of testing maritime cybersecurity via different tools to detect potential attacks, is vital for minimizing risks.

2017-11-08

UK Must Prepare For The 4th Industrial Revolution

Advanced digital technology could give UK manufacturing a huge boost and create hundreds of thousands of jobs, a new report claims.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

Medigate

Medigate

Medigate is a dedicated medical device security platform protecting all of the connected medical devices on health care provider networks.

Ericom Software

Ericom Software

Ericom is a global leader in securing and connecting the digital workspace, offering solutions that secure browsing, and optimize desktop and application delivery to any device, anywhere.

Webtotem

Webtotem

Webtotem's mission is to prevent the global epidemic of website infection and provide every website owner with basic security rights.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

Cybil

Cybil

Cybil is a publicly-available portal where members of the international cyber capacity building community can find and share information to support the design and delivery of programs and projects.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

Depth Security

Depth Security

Depth Security assessment services provide organizations with real-world visibility into threats facing their infrastructure and applications.

Athreon

Athreon

Athreon utilizes a fusion of AI technology, human interpretation, and the latest in cybersecurity to deliver sound business solutions that help our clients make better data-driven decisions.

Tozny

Tozny

Tozny offers products with security and privacy in mind that are built on the foundation of end-to-end encryption, and open-source verifiable software.

ALSCO

ALSCO

ALSCO is dedicated to bringing first class IT services, technical support, and solutions to goverment, companies and organizations worldwide.

Venticento

Venticento

Venticento is an IT company specialized in consulting and network support and assistance for companies that need to make their business processes more effective.

Smartcomply

Smartcomply

Smartcomply is an automated and AI-powered cybersecurity and compliance platform that aids businesses in reducing the time and money spent on cybersecurity and compliance.

Cassini

Cassini

Cassini Cyber Threat Intelligence (CTI) helps protect your organisation from cyber attacks using threat intelligence from trusted New Zealand agencies.