News

2016-05-13

Can FinTech Supersede Financial Services Workers?

The world of finance is being transformed by emerging technologies, and that will mean lots of lost jobs.

2016-05-13

Tech Jobs Would Be Great, If It Wasn’t For The Users

IT jobs would be so much better if they didn’t have to deal with other people.

2016-05-13

Exposing Cybercrime As A Business Model

Trustwave reveal how sophisticated criminal organizations are most likely to attack, and more importantly, how potential victims can defend their assets

2016-05-11

Spying On You In Britain

Since the late 1990s UK agencies have collected bulk personal data about many people who are “unlikely to be of intelligence or security interest”.

2016-05-12

IS Forms Mega Hacking Group

The super hacking unit is labeled United Cyber Caliphate (UCC).

2016-05-11

Hit By DDoS? You Will Be Hit Again…

More than 80% of DDoS victims are attacked a second time.

2016-05-11

Tracking Islamic State Impeded By Encryption

Islamic State is the 'most sophisticated' user of the Internet and the available technologies to ensure end-to-end encryption.

2016-05-11

SpyEye Masterminds Begin 24 Year Sentence

SpyEye banking malware caused losses of nearly $1 billion and infected over 50 million computers. Two jailed, one still at large.

2016-05-10

Cyber "Best Practices" Are About To Change

The solution to our cyber crisis is not as difficult to understand as most people think. Opinion by Christopher Murphy

2016-05-13

Pentagon Wants to ‘Fingerprint’ The World’s Hackers

DARPA plans to track hackers to create “algorithms for developing predictive behavioral profiles,” linking malicious activity to individuals.

2016-05-10

Automated Malware Analysis Central to Defense Strategies

Research firm Forrester are hailing automated malware analysis as a big step forward in network security.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Redbud

Redbud

Redbud is a specialist search and recruitment firm for Information Security professionals.

Secure-NOK

Secure-NOK

Secure-NOK provides products and solutions that detect and remove security attacks and harmful events in industrial networks and control systems.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

Securely

Securely

Securely Ltd. is an IT consulting and services firm specializing in PKI solutions and products.

Riverside Research

Riverside Research

Riverside Research is a not-for-profit organization chartered to advance scientific research in areas including Trusted & Resilient Systems.

Greenetics Solutions

Greenetics Solutions

Greenetics Solutions is a company focused on providing solutions for information security.

Smart Contract Security Alliance

Smart Contract Security Alliance

The Smart Contract Security Alliance supports the blockchain ecosystem by building standards for smart contract security and smart contract audits.

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

Cyphere

Cyphere

Cyphere is a cyber security company that helps to secure most prized assets of a business. We provide technical risk assessment (pen testing/ethical hacking) and managed security services.

PNGCERT

PNGCERT

PNGCERT is the national Computer Emergency Response Team (CERT) for Papua New Guinea.

ShieldApps

ShieldApps

ShieldApps comprehensive suite of products is designed to protect your personal devices from privacy threats, including hacking attempts, online tracking, fingerprinting, phishing, malware, and more.

IPKeys Cyber Partners

IPKeys Cyber Partners

IPKeys Cyber Partners, together with the IPKeys Power Partners unit, provide Cyber Security and CIP Compliance for utilities, grid operators and public safety organization across the USA.

Central Intelligence Agency (CIA)

Central Intelligence Agency (CIA)

The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. This includes cyber security related activities.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

Lintu Solutions

Lintu Solutions

Lintu Solutions is a trusted provider of comprehensive cybersecurity and enterprise risk management solutions.

OrbiSky Systems

OrbiSky Systems

OrbiSky Systems is a British tech startup specializing in data management and cybersecurity solutions.