News

2016-01-20

Commercial Opportunities To Be Found In Security Problems

It's not only a vital defensive measure. There's money to be made from securing company data.

2016-01-20

Fighting Cybercrime Can Be Turned Into A Commercial Opportunity

Companies can use security initiatives to improve their customers’ experience and drive greater sales.

2016-01-19

Mentoring Startups: Technology Solving Education Problems

One to One: Startups are using online mentorship to combine the strengths of technology with the unique value of human beings.

2016-01-20

Hefty Fine Over False Encryption Claims

Dental software company pays a penalty for misleading customers on the level of encryption it provided to protect sensitive patient data.

2016-01-20

Anonymous Want Revenge For Saudi Executions

Hackers have targeted Saudi Arabia's Ministry of Defence website with a sustained DDoS attack.

2016-01-21

Russian Hackers Warn EU Trains Are Vulnerable to Hijack

Russian hackers have exposed gaping holes in computer systems that control train networks across Europe.

2016-01-19

Amazon’s Data Centers Are Located in US Spy Country

There's a reason Amazon Web Services are located close to US intelligence infrastructure.

2016-01-20

EU General Data Protection: A Milestone Of The Digital Age

The recently agreed-upon EU General Data Protection Regulation (GDPR) might be the most important piece of legislation in the history of the EU.

2016-01-19

Drone Market Worth $14.9 Billion by 2020

The Unmanned Aerial Vehicles (UAV) market is estimated to reach $14.9 Billion by 2020, at a CAGR of 8.12% from 2015.

2016-01-19

Mandatory Requirement on Business To Disclose Cyber Attacks

Companies that do not “come clean” about being the victims of cyber crime should face prosecution, says British MP.

2016-01-21

Can the Warfare Concept Of Manoeuver Be Usefully Applied In Cyber Operations?

Although the cyber domain has unique characteristics, the timeless principles of manoeuver warfare still apply. Opinion by David Gioe

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CyTech Services

CyTech Services

CyTech provides unique services and solutions complemented with professional subject matter experts to both the Federal and Commercial sectors.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

Thomas Miller Specialty

Thomas Miller Specialty

Thomas Miller Specialty is a commercial Managing General Agency providing specialty risks insurance including Cyber & e-crime insurance.

Honeynet Project

Honeynet Project

The Honeynet Project is a leading international non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools.

Zecurion

Zecurion

Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest and in motion.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

ClearBlade

ClearBlade

ClearBlade is the Edge Computing software company enabling enterprises to rapidly engineer and run secure, real-time, scalable IoT applications.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

ThreatGen

ThreatGen

ThreatGEN™ works with your team to improve your resiliency and industrial cybersecurity capabilities through an innovative and modernized approach to training and services.

PurpleSynapz

PurpleSynapz

PurpleSynapz provides hyper-realistic Cyber Security Training with a modern curriculum and Cyber Range.

ToucanX

ToucanX

ToucanX has eliminated remote attack vectors without sacrificing productivity. We’ve brought embedded near real time virtualization to the enterprise endpoint.

Boeing

Boeing

Boeing is the world's largest aerospace company and leading manufacturer of commercial jetliners, defense, space and security systems.

Exium

Exium

At Exium we’ve integrated networking and security in a cloud-delivered Zero Trust platform powered by 5G and open source.

Comcast Technology Solutions (CTS)

Comcast Technology Solutions (CTS)

Comcast Technology Solutions delivers proven technologies for global video, media, communications, data applications, and cybersecurity & compliance.

Basalt

Basalt

Basalt provide qualified consulting services in information security, personnel security and physical security.