News

2017-01-06

Ex-MI6 Chief Warns Over Electronic Voting

The stubby pencil and piece of paper that you put your cross on in the ballot box is actually much more secure than anything which is electronic

2017-01-06

Virtual Reality Is Getting Real In 2017

Is VR is going to become the next major computing platform, in the same way that mobile phones have superceded desktop PCs?

2017-01-06

Company Boards Need To Get A Grip.

Corporate leaders, especially boards of directors, aren't taking the necessary actions to defend their companies against cyber attacks.

2017-01-06

Digital Forensics, Incident Response & Attribution

The cost of not taking cyber security seriously today is just like the cost of not having your business properly insured.

2017-01-05

Artificial Intelligence, Self-driving Cars & Cyberwar In 2017

If 2016 was a year of unprecedented disruption in the Technology sector, what does 2017 hold in store? More of the same....

2017-01-04

How Cyber Attacks Will Get Worse In 2017

It was thought 2016 would see more cybersecurity activity than 2015 and it did. Here are some of the escalated challenges to be faced in 2017.

2017-01-04

Russian Military Was Behind Hacking Clinton Campaign

Crowdstrike say they have evidence to link the Clinton campaign hacks with malware used by the Russian military intelligence team, Fancy Bear.

2017-01-03

Cyber Criminals Are Making $200k A Month

Recorded Future have been researching the dark web for cybecrime forums. It turns out the bad guys can make good money stealing from each other.

2017-01-03

Robots Can Build Weapons

Faster, cheaper and more accurate. Raytheon has changed the way it builds deadly missiles.

2017-01-03

The Worst Hacks In 2016

Before 2016, most network intrusions targeted enterprises & large corporations, but last year saw a much more diverse range of victims.

2016-12-30

How Russian Cyber Power Attacked The US

Who's To Blame? The FBI's failure to grasp the scope of the initial attacks on the Democratic party undercut efforts to minimize their impact.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Research Institute in Trustworthy Industrial Control Systems (RITICS)

Research Institute in Trustworthy Industrial Control Systems (RITICS)

RITICS is one of three Research Institutes formed as part of the UK National Cyber Security Strategy.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

AFCON Control & Automation

AFCON Control & Automation

AFCON is a leading global provider of software solutions and services for the smart management of Control & Automation systems in the age of Digital Transformation.

SCIPP International

SCIPP International

SCIPP’s courses are based on internationally recognized best business practices for security awareness, for both technical and non-technical staff and to comply with regulatory mandates.

Neupart

Neupart

Neupart provides Information Security Management System, Secure ISMS, allowing organisations to automate IT Governance, Risk and Compliance management.

Search Guard

Search Guard

Search Guard® is an Open Source security suite for #Elasticsearch and the entire #ELK stack that offers encryption, authentication, authorization, audit logging and multi tenancy.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

Cybersecurity Coalition

Cybersecurity Coalition

The mission of the Cybersecurity Coalition is to bring together leading companies to help policymakers develop consensus-driven policy solutions to achieve improvements in cybersecurity.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

PQShield

PQShield

PQShield are specialists in Post-Quantum Cryptography. We provide quantum-secure cryptographic solutions for software, software/hardware co-design and data in transit.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

Dr Web

Dr Web

Since 1992 the Russian anti-virus Dr.Web has been helping companies to keep their digital assets protected and operate in a secure digital environment.

CovertSwarm

CovertSwarm

Since 2020 CovertSwarm have been radically redefining how enterprise security risks are discovered. We outpace the cyber threats faced by our clients using a constant cyber attack methodology.

Anthropic

Anthropic

Anthropic is a Public Benefit Corporation, whose purpose is the responsible development and maintenance of advanced AI for the long-term benefit of humanity.