News

2016-02-03

The Dismal Sate Of Payment Data Security

A global study shows a critical need for organizations to fix their payment data security practices before new payments methods grow.

2016-02-03

Cyber and Reality Domains Converge As The US Targets ISIS Hackers

The threat posed by ISIS is bringing new meaning to convergence as the US military starts using air strikes against hacking groups.

2016-02-01

Egyptian Uprising - a 'social media revolution'?

The 'Arab Spring' pro-democracy uprisings and their outcomes varied wildly, yet they had one defining characteristic in common: social media.

2016-02-03

The Tech Revolution Will Change Or Even Erase Your Job

The 4th Industrial Revolution is under way and while it could lead to the loss of more than 7 million jobs, it's good news for some specialisations.

2016-02-03

10 Most Notorious Hacking Groups

Hacking has grown massively in the past few years and has become professional. Who are the 10 of the most notorious hacking groups so far?

2016-02-01

Israel’s Electrical Grid Cyber Attacked

The incident occurred during two consecutive days of record-breaking winter electricity consumption.

2016-02-01

Lloyd’s Insurer Says Cyber Risks Are Too Big to Cover

The head of the largest of Lloyd’s of London insurers says the potential liabilities from risks of cyber attack are too large to cover.

2016-02-01

Business Is Struggling To Combat Hacking

CISCO's 2016 Annual Security Report sheds light on the issues businesses are currently facing when it comes to cyber security.

2016-02-15

CIO Work Report - Executive Brief (£)

Studies of Chief Information Officer (CIO) employment shows that they tend to stay in a job on average for only 4 years and 4 months. Nevertheless, the likelihood of a long career often increases significantly for those CIOs that stay longer than 2 years and get engaged with their organisations.

2016-02-15

Corporations Drowning In The Data Flood (£)

All businesses have a major problem waiting for a solution but, is it something that most Boards never talk about. The storage of data, its costs and lack of use is a problem and an opportunity awaiting a solution.

2016-02-15

Proposed UK Law Requiring Business To Disclose Cyber Attacks (£)

Governments will over the next decade introduce legislation forcing businesses to firms to notify shareholders and police immediately after they have been hacked just as they would be expected to do for traditional security breaches.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Acumin Recruitment

Acumin Recruitment

Acumin is an internationally established Cyber Security recruitment specialist.

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

ISC2

ISC2

ISC2 is an international, non-profit membership association for information security leaders. Our information security certifications are recognized as the global standard for excellence.

NovaTech Automation

NovaTech Automation

NovaTech products and services make the world’s power grids and essential process industries more reliable, efficient, sustainable and secure.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

World Informatix Cyber Security (WICS)

World Informatix Cyber Security (WICS)

World Informatix Cyber Security provides a range of cyber security services to protect valuable information assets to global business and governments.

Securosys

Securosys

Securosys is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmission

Cyberfort Group

Cyberfort Group

Cyberfort exists to provide our clients with the peace-of-mind about the security of their data and the compliance of their business.

Sec-Ops

Sec-Ops

Sec-Ops is a forward thinking cyber security company, formed by a group of security enthusiasts with years of experience and backgrounds in the technology and the government industries.

Open Quantum Safe (OQS)

Open Quantum Safe (OQS)

The Open Quantum Safe (OQS) project is an open-source project that aims to support the development and prototyping of quantum-resistant cryptography.

Appalachia Technologies

Appalachia Technologies

Appalachia is a full service Managed Services Provider with a focus on cybersecurity, backed by the best engineers.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

CSIR Information & Cybersecurity Research Centre

CSIR Information & Cybersecurity Research Centre

The CSIR Information & Cybersecurity Research Centre focuses on research, development, and innovation of home-grown cyber and information security.

Zanutix Consulting

Zanutix Consulting

Zanutix specialize in a wide range of services including Network Design and Implementation, Data Management, Cloud Solutions, Software Development and Cybersecurity.