News

2016-05-12

No Phone Is Safe from Hackers & Spies

The illusion of privacy: Hackers only need your phone number in order to listen in on phone calls, read texts or track your geographic location.

2016-05-30

Pushing Back Sexism - A New Era For Women In Technology.

Women are challenging global technology companies and empowering themselves and each other to be safer online.

2016-05-10

CyberScape – The Growing Influence of Cyber Threats (£)

Cyber issues have entered most of the areas of any organisation’s systems and often, routine working methods and communications.

2016-05-10

Cyber Stalking: It's Real & Potentially Deadly (£)

When a “digital issue” became a real life danger.

2016-05-09

Cyber Revolution: A Big Step Change Business Leaders Need To Understand (£)

A revolution is taking place that compares to the Agricultural and the two earlier Industrial Revolutions and for many senior directors and strategic policy managers this has not yet been fully understood.

2016-05-10

Important IT Security Requirements For Business Leaders (£)

The implementation of cyber security skills and IT security departments have significantly increased in the last eighteen months and it has become an important issue that business directors and especially CEOs, Financial Directors and of course CIOs and IT Directors need to fully understand.

2016-05-09

US National Intelligence Director Says Snowden Hastened Encryption By 7 Years

James Clapper says Snowden has had an accelerator effect on commercially available encryption, making it much harder to track terrorists.

2016-05-09

Zuckerberg Thinks AI Will Know Everything About You.

Both Facebook and Google are pursuing machine learning technologies to take a deep look into what each user is posting, sharing & consuming

2016-05-09

Search It Yourself: Panama Papers Database Goes Public

The body behind the Panama Papers revelations makes an enormous database of financial data public today.

2016-05-09

Future Intelligence Sharing In the Syrian War

Integrated Intelligence: Fifteen years after 9/11, America's intelligence community finally has a rapid, modern sharing system.

2016-05-06

One Massive Hack Last Year - Nobody Noticed!

Hackers stole a database with the details of 57 million people.The breach was discovered only after the data was put up for sale on the dark web.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Black Duck Software

Black Duck Software

Black Duck Hub allows organizations to manage open source code security as well as license compliance risks.

Experian

Experian

Experian provide software solutions to help organizations prevent identity fraud and crime.

CyberDef

CyberDef

CyberDef is a consulting company specialising in cyber defence services for small and medium enterprises.

Computer Forensics Consult (CFC)

Computer Forensics Consult (CFC)

Computer Forensics Consult provides disaster recovery, computer forensics, electronic discovery and litigation support services in the growing area of Cyber Security.

QI ANXIN Technology Group

QI ANXIN Technology Group

QI ANXIN specializes in serving the cybersecurity market by offering next generation enterprise-class cybersecurity products and services to government and businesses.

Option3

Option3

Option3 (formerly Option3Ventures - O3V) primarily seek control investments in the growing cybersecurity mid-market, seeking to build champions with the scale to bring cutting-edge products to market.

IPification

IPification

IPification is a highly secure, credential-less, network-based authentication solution for frictionless user experience on mobile and IoT devices.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce has partnered with Purdue University and Carnegie Mellon University to create the Rolls-Royce Cybersecurity Technology Research Network.

IPKeys Cyber Partners

IPKeys Cyber Partners

IPKeys Cyber Partners, together with the IPKeys Power Partners unit, provide Cyber Security and CIP Compliance for utilities, grid operators and public safety organization across the USA.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

Association of Azerbaijani Cyber Security Organizations (AKTA)

Association of Azerbaijani Cyber Security Organizations (AKTA)

The Association of Azerbaijani Cyber Security Organizations (AKTA) is a non-commercial organization aimed at strengthening the country's cybersecurity system.

Brennan IT

Brennan IT

For over 25 years, Brennan’s expert team has helped businesses achieve real success through innovative and secure technology solutions.

Nokod Security

Nokod Security

Nokod Security delivers an application security platform for low-code / no-code custom applications and Robotic Process Automation (RPA).

Cipher Net Shield

Cipher Net Shield

Cipher Net Shield specializes in secure E-wallet solutions with a strong focus on blockchain and cybersecurity, prioritizing both transaction security and the recovery of lost capital.