News

2017-11-01

‘Bad Rabbit’ Cyber Attack Hits Russia & Ukraine

Malware shuts down Russia's main news agency and Ukraine's air transport system in a well co-ordinated campaign.

2017-10-30

UK Health Service Should Have Prevented WannaCry Attack

NHS hospitals & patient data were left vulnerable to a major ransomware attack because cybersecurity recommendations were not followed.

2017-10-31

A New IoT Botnet Storm Is Coming

The cyber storm clouds are gathering. A new Botnet is recruiting IoT devices at a far greater pace and with more potential damage than Mirai.

2017-10-30

Iran Responsible For Cyber Attack On British Parliament

A sustained attack that compromised over 90 MPs Email accounts is thought to be Iran’s first act of cyberwarfare against Britain.

2017-10-31

Microsoft Chief Says N. Korea Was Behind 'WannaCry'

Brad Smith confirms N. Korea was behind the devastating WannaCry ransomware attack that temporarily crippled UK Healthcare organisations.

2017-10-31

Israeli Spies Hacked Kaspersky

Israeli agents hacked Kaspersky to provide the crucial evidence to ban the cybersecurity company from supplying the US government.

2017-11-13

AI Can Guess Your Password

A new application of artificial intelligence & deep learning in information security focuses on more efficiently guessing passwords. It seems to work.

2017-11-02

Insurance Will Reduce Cyber Losses

The increasingly serious and large-scale nature of cyberattacks is creating problems for companies and clients of all sizes and on all levels.

2017-11-10

Russian Hacking Fuels Return To Paper Ballots

US regional election authorities are thinking of reversing the trend towards vulnerable electronic systems.

2017-10-24

News E-models For Quality Journalism

Wikipedia founder Jimmy Wales is embarking on a new online venture that the rest of us can only hope succeeds: Creating a new business model for quality journalism.

2017-11-06

Criminalised: Watching Terrorist Propaganda Online

Watching streamed extremist material online will be a criminal offence in Britain in plans to crackdown on terrorist propaganda.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CW Jobs

CW Jobs

CWJobs.co.uk is a leading specialist IT recruitment website covering all areas of IT including Cyber Security.

Efecte

Efecte

Efecte is a Nordic SaaS company specialized in IT Service Management, Self-Service, Identity Management and Access Governance solutions.

Cybernetic Global Intelligence (CGI)

Cybernetic Global Intelligence (CGI)

CGI is a global IT Security firm that helps companies protect their data and minimize their vulnerability to cyber threats through a range of services such as Security Audits and Managed Services.

Malomatia

Malomatia

Malomatia is a leading provider of technology services and solutions in Qatar including information security.

ArcRan Information Technology

ArcRan Information Technology

ArcRan concentrates on developing comprehensive cybersecurity solutions for smart city applications. We believe that cybersecurity is the fundamental enabler of IoT development.

Granted Consultancy

Granted Consultancy

Granted Consultancy is a business consultancy that specialises in securing funding to support companies with the development and commercialisation of new and innovative products and technologies.

InterGuard

InterGuard

As the pioneer for Unified Insider Threat Prevention and productivity monitoring tools, InterGuard offers on premise and SaaS-based services that are easily available and affordable.

Senserva

Senserva

Senserva delivers a deep analysis for security user accounts and applications within the Microsoft cloud environment.

National Security Services Group (NSSG) - Oman

National Security Services Group (NSSG) - Oman

National Security Services Group (NSSG) is Oman's leading and only proprietary Cybersecurity consultancy firm and Managed Security Services Provider.

Cyber Unit

Cyber Unit

Cyber Unit offer next level protection from cyber attacks in packages and pricing options that are accessible to smaller organizations.

Hook Security

Hook Security

Setting a new standard in security awareness. Hook Security is a people-first company that uses psychological security training to help companies create security-aware culture.

BugProve

BugProve

BugProve offers a firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.

Sirti

Sirti

Sirti is Italy's leading technology company in the design and production of network infrastructures and telecoms system integration.

ZEUSS

ZEUSS

ZEUSS is a diversified data center, cybersecurity, and green energy company.

Alchemy Security Consulting

Alchemy Security Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.

CardinalOps

CardinalOps

The CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack so you can easily implement a threat-informed defense.