News

2016-11-19

Securing Data in the Cloud

Storing data in the cloud is a standard practice for today’s connected business. That does not mean they can afford to be complacent about security.

2016-11-18

Cyber-attacks & Hacking: What You Need To Know

Is the UK Government's investment of £1.9 Billion in cybersecurity defence plus a retaliatory capability really enough to address all the threats?

2016-11-15

UK Will Retaliate Against Cyberattacks

Preparing To Retaliate: Hostile "foreign actors" are developing techniques that threaten the UK's electrical grid and airports.

2016-11-10

Pepper Keep’s Son Robot Dreams on Hold

Japan's obsession with robots isn't just a cliché. Companies have been trying to drum up enthusiasm for them for years, with little success.

2016-11-11

A Career In Cyber Security Governance?

Cyber security governance jobs are growing faster than IT and there just aren't enough skilled professionals to fill the available jobs.

2016-11-11

The US Cyber Threat Against Russia

Off The Record: The US has penetrated Russia’s electric grid, telecommunications networks and the Kremlin’s command systems.

2016-11-11

Black Hat Europe Has Concerns About EU Metadata

Metadata is being collected on us by new technologies and government actions, but is there the intelligence to join the dots?

2016-11-11

France Creates A Big Brother Data File

France has created a central database containing biometric and personal information of its citizens, raising concerns about privacy & freedom.

2016-11-09

Smartphone Attachment Can Detect Cancer

A portable sensor that uses a smartphone's camera to detect a biological indicator for several types of cancers with 99% accuracy.

2016-11-09

NATO Cyberwar: Establishing Rules Of Engagement

Counter-measures are operations that would otherwise be unlawful but can be used if the purpose is to stop another state from violating the law.

2016-11-09

Fears Of Hacked US Election Ebb Away

The US government assertions that Russia was destabilising the election and Donald Trump's claim the process was rigged have come to nothing.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer is a global law firm with a track record of successfully supporting the world's leading corporations, financial institutions and governments.

ThaiCERT

ThaiCERT

ThaiCERT is the national Computer Security Incident Response Team (CSIRT) for Thailand.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

KLC Consulting

KLC Consulting

KLC Consulting offers information assurance / Security, IT Audit, and Information Technology products and services to government and Fortune 1000 companies.

IronNet Cybersecurity

IronNet Cybersecurity

IronNet’s product and services provide enterprise-wide security management and visibility of your network, users and assets.

Allentis

Allentis

Allentis provide adapted solutions to ensure the security and performance of your information system.

SpiderOak

SpiderOak

SpiderOak's portfolio of Secure Communication & Collaboration products ensure the confidentiality, integrity, and availability of your most sensitive data in any environment.

Superus Careers - Cyber Career Exchange

Superus Careers - Cyber Career Exchange

The Cyber Career Exchange is a specialized recruiting platform focused specifically on cybersecurity.

Phronesis Security

Phronesis Security

Phronesis Security is committed to delivering world-class cyber security consulting with a tangible social and environmental impact.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.

Cognisys Group

Cognisys Group

Cognisys provides cyber security penetration testing and compliance services from its offices in Leeds and Manchester.

Alethea

Alethea

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation.

Stacklok

Stacklok

Stacklok are an Open Source first security company enabling safe Open Source Software consumption.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.

US Insider Risk Management Center of Excellence (US-InRM)

US Insider Risk Management Center of Excellence (US-InRM)

The US-InRM Center of Excellence is a nonprofit organization dedicated to promoting private, public, and academic partnerships to foster knowledge sharing and resources to mitigate insider risk.