News

2017-04-05

Turn Threat Data Into Threat Intelligence

Using threat intelligence from others to protect your own organisation is a powerful concept, except when the other data is misleading or wrong.

2017-04-07

Facebook’s Shifting Attitude To Controversy

Should technology companies like Faceboook & Twitter take any editorial responsibility for the media they distribute on their platforms?

2017-03-03

Self-driving Ubers are now in Arizona

Uber pinned hopes on running its self-driving fleet in San Francisco but motored off to Arizona two months ago when that plan ran up against some local red tape.

2017-03-03

Iran Cyber Attacks on Saudi Arabia

After a four-year hiatus, Iran recently resumed destructive cyber-attacks against Saudi Arabia in what US officials say is part of a long-term strategy by Tehran to take over the oil-rich kingdom and regional US ally.

2017-03-03

Google To Break Pirates Over Music Searches

UK government-hosted talks spanning two Parliaments have culminated in Google and Bing at last agreeing to tweak their search results in response to copyright-holders' concerns, thereby heading off threatened legislation on their conduct.

2017-03-25

Facebook & Google Are Killing Newspapers

National and local newspapers are dying, while Facebook along with Google controls two-thirds of the online advertising market.

2017-04-21

Malvertising Targets Your Online Users

Many of the most popular websites have at one time or another unwittingly hosted malicious ads.

2017-03-03

Cyber-Workforce Shortage to Increase

The serious talent shortage in the information security workforce shows no sign of waning:

2017-04-21

Cyber Skills Gap Grows Along With Threats

Cybersecurity Skills Gap: Fewer than one in four job applicants possess the qualifications that employers are looking for.

2017-02-27

Snowden Helping To Protect Journalists

Edward Snowden is working on tools for journalists that he hopes will help to protect them and their sources from government surveillance.

2017-02-24

DDoS Protection: 14 Unique Ways to Protect Your Organisation

DDoS attacks have become a nightmare for companies with an active online presence. Here are 14 ways to protect your business.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CERT.at

CERT.at

CERT.at is the Austrian national Computer Emergency Response Team.

DataVantage

DataVantage

DataVantage data masking and data management software helps you prevent data breaches, pass compliance audits and meet regulatory requirements such as HIPAA and PCI DSS.

8MAN

8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments.

CyberOwl

CyberOwl

CyberOwl builds on cutting-edge research and combines decades of experience in developing, securing and operating large distributed systems.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

FedRAMP

FedRAMP

FedRAMP, is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

miniOrange

miniOrange

miniOrange is a cloud and on-premise based identity and access management (IAM) solution provider.

24By7Security

24By7Security

24By7Security are Cybersecurity & Compliance Specialists with extensive hands on experience helping businesses build a defensive IT Infrastructure against all cyber security threats.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

Flat6Labs

Flat6Labs

Flat6Labs is the MENA region’s leading seed and early stage venture capital firm, currently running the most renowned startup programs in the region.

SeeMetrics

SeeMetrics

SeeMetrics is an automated cybersecurity performance management platform that integrates security data and business objectives into a simple interface.

Databarracks

Databarracks

Databarracks deliver award winning IT resilience and continuity services. We help organisations get the most out of the cloud and protect their data, wherever it lives.

The Hacking Games

The Hacking Games

The Hacking Games' Mission is to inspire, educate and mobilise a generation of ethical hackers to make the world a safer place.

M6iT Consulting

M6iT Consulting

M6iT Consulting is an industry-leading solution partner managing the IT requirements for a full range of companies.

Cyber Guards

Cyber Guards

Cyber Guards provide comprehensive, turn-key cyber security programs for small and mid-size business for about the cost of one full-time cybersecurity hire.

Quotient

Quotient

Quotient builds digital experiences that empower and inspire the American people by understanding their needs, simplifying complex technical solutions and adapting to how they work, live and learn.

Dialog Enterprise

Dialog Enterprise

Dialog Enterprise is the corporate ICT solutions arm of Dialog Axiata, Sri Lanka’s leading connectivity provider.

Softcell Technologies Global

Softcell Technologies Global

Softcell is one of India's leading System Integrators. We serve enterprise customers in the areas of IT Security, Mobility, Optimised IT Infrastructure, Cloud and Engineering Services.