News

2016-01-18

ISIS Has a New Secure Messaging App

An encrypted Android app for exchanging secure messages, joining another app that distributes propaganda and recruiting material.

2016-01-15

Five Things That Happened To Data In 2015

2015 was a fascinating and challenging year for all those involved with data. Here are the 5 most significant. Opinion by David Reed of DataIQ

2016-01-15

US Critical Infrastructure Is Vulnerable To Electromagnetic War

An EMP attack could fry all non-shielded electronics, crippling infrastructure and paralysing both vital & non-vital services.

2016-01-15

NSA Chief Says The Rules of War Do Apply to Cyberwar

The Pentagon keeps its rapidly expanding cyber arsenal almost entirely secret.Is there a way to publicly discuss the future of cyber operations?

2016-01-13

Predictive Analytics Tools Confront Insider Threats

Advanced data analytic technology can give analysts an advantage in finding insider threats.

2016-01-13

Experts Make 2016 Cybersecurity Predictions

A new frontier of data breach issues is on the horizon

2016-01-14

Cyberwar Represents An Existential Threat

The advent of cyberwar represents a new “high bar risk” as the U.S. faces-off against a deadly triad of cutting-edge digital technologies.

2016-01-13

Is The Password Dead?

Will 2016 be the year when passwords become obsolete? Or will we just continue to grin and bear it? What’s the matter with passwords, anyway?

2016-01-13

Indian ‘Black Hats' Hack Pakistani Websites

A group of Indian hackers hacked and vandalized seven Pakistani websites including that of Pakistani Lawyers' Bar Council.

2016-01-18

Top 2016 Big Data Challenges: Skills Shortage

In 2016, big data will lend support to almost every function of a business. But there is a huge organisational challenge to staff big data projects.

2016-01-13

Cyber Security In Modern Railways

Railways are part of national critical infrastructure. New research identifies a long list of security issues affecting railroad systems.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Rackspace Technology

Rackspace Technology

Rackspace Technology is a leading provider of managed services across all major public and private cloud technologies. Secure your IT environments with powerful cloud security solutions and support.

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU CCIS is a national centre for research, education, testing, training and competence development within the area of cyber and information security.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

Sysdig

Sysdig

With Sysdig teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

Propelo

Propelo

Propelo (formerly LevelOps) is an engineering excellence platform that helps increase developer productivity and improve security with data-led insights and workflow automation.

IT Band Systems

IT Band Systems

IT Band Systems is an international provider of IT products and services including web server monitoring and web security consulting.

ClassNK Consulting Service (NKCS)

ClassNK Consulting Service (NKCS)

ClassNK Consulting provides consulting services to the maritime industry with a focus on safety, security and compliance.

MAXXeGUARD Data Safety

MAXXeGUARD Data Safety

MAXXeGUARD: The High Security Shredder. MAXXeGUARD easily destroys hard disks up to the highest security levels as well as other digital data carriers like SSD’s, LTO’s, USB’s, CD’s etc.

WhiteJar

WhiteJar

WhiteJar offers an innovative approach to modern cybersecurity needs, empowering Ethical Hackers within its unique crowd platform.

Sunnic

Sunnic

Sunnic is a leading provider of comprehensive digital data security technology.

PDI Technologies

PDI Technologies

PDI Technologies helps convenience retail and petroleum wholesale businesses around the globe increase efficiency and profitability by securely connecting their data and operations.

InfoSight

InfoSight

InfoSight offers proven Cyber Security, Regulatory Compliance, Risk Management and Infrastructure Solutions to protect your business and your customers from cyber crime and fraud.

Tuskira

Tuskira

Tuskira is a Preemptive Cyber Defense & Response Platform powered by Agentic AI, designed to go beyond traditional vulnerability management.

Command Zero

Command Zero

Command Zero is the industry’s first autonomous and AI-assisted cyber investigations platform, built to transform security operations in complex enterprise environments.