News

2016-08-10

Banks Look Up To The Cloud

Banks are growing more comfortable using other companies’ servers instead of their own closely guarded data centers.

2016-08-10

ISIS Is Tooling Up For Cyber Jihad

Islamic terrorists are arming themselves with the technical tools & expertise to attack the online systems underpinning critical infrastructure.

2016-08-12

Defensive Measures: Estonia Will Store Citizens’ Data In The UK

Estonia is planning to back up its entire store of citizen data in the UK, fearing another cyberattack from neighboring Russia.

2016-08-10

Did Munich Gunman Get His Weapon On The Dark Web?

Unlike the U.S, it is quite hard to get access to automatic weapons in Germany. So where did the gunman get his weapon?

2016-08-10

Candidate Trump Supports Russian ‘cyber warfare’ Against US

Backlash over comments during a recent press conference in which he urged Russian hackers to steal rival candidate Hillary Clinton’s emails.

2016-08-10

European Privacy Directive: Encryption Without Backdoors

The EU rules designed to protect privacy in electronic communications need to reflect the world that exists today.

2016-08-13

UK Security Agencies Say Mass Internet Spying Is Crucial

Privacy Trial Begins: UK spy agencies contend that interception of communications is critical in protecting the country against terrorism.

2016-08-08

Bio-Electronics: A New Business Controlling Human Organs With Electronic Implants

Google & GSK invest £540m in creating automated bio- electronic nerve implants to fix defects in human tissue.

2016-08-09

Cybersecurity Issues Are M&A Deal Breakers

M&A experts warn that due-diligence audits of companies targeted for acquisition often reveal cybersecurity risks that compromise compliance.

2016-08-09

Insider Trading: Ukrainian Hackers Accomplice Pleads Guilty

US stockbroker pleads guilty to conspiracy for his role in an insider-trading ring that reaped millions of dollars in illicit profits.

2016-08-09

Mobile Battery Tracks You Online

A little-known web standard that lets site owners tell how much battery life a mobile device has left has been found to enable tracking online.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Purdicom

Purdicom

Purdicom (formerly known as Selcoms) is an award winning distributor specialising in Wireless, Cloud & Security technologies.

International Conference on Information Systems Security & Privacy (ICISSP)

International Conference on Information Systems Security & Privacy (ICISSP)

The ICISSP event is a meeting point for researchers and practitioners to address security and privacy challenges concerning information systems.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

Culinda

Culinda

Culinda secures medical IoT devices in hospitals with An Artificial Intelligence platform and security gateway.

Mend.io

Mend.io

Mend.io (formerly known as WhiteSource) is an application security company built to secure today’s digital world.

Innosphere Ventures

Innosphere Ventures

Innosphere Ventures is Colorado’s leading science and technology incubator, accelerating the success of high-impact startup and scaleup companies.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

Qohash

Qohash

With a focus on data security, Qohash supports security, compliance and optimization use cases enhancing your risk management process.

Start Left® Security

Start Left® Security

From Posture to Performance—The System That Improves How Software Gets Built.

NACVIEW

NACVIEW

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections.

Digital Edge

Digital Edge

Digital Edge provides unparalleled Managed Cloud Solutions, as well as superior Information Technology Support Services.

Levio

Levio

Levio is a digital native business and technology consulting firm. As a true partner from start to finish, our goal is a long-lasting transformation that’s right for your business model.

iConnect IT Business Solutions DMCC

iConnect IT Business Solutions DMCC

iConnect is a trusted IT Solutions and Technology Services company, proudly serving clients across the Middle East and Africa.

Corporater

Corporater

Corporater provides organizations with integrated solutions for managing governance, performance, risk, and compliance built on a single platform.

ZehnTek

ZehnTek

ZehnTek is a premier technology solutions provider, committed to offering comprehensive IT services tailored to meet the diverse needs of businesses.