News

2015-12-02

Coinbase Shift Payments To Bitcoin Debit Card

A debit card integrating all your currencies, both real and virtual, together in one payment source.

2015-12-02

Cyber Security Firm Tanium Raises New Capital At $2.5billion Valuation

Investors see that what makes Tanium unique is its ability to detect and fix enterprise security threats quickly.

2015-12-04

Russian Financial Cybercrime

Russian cyber criminals have evolved and gained a reputation for sophisticated financial crime; it's top flight are believed to have stolen over $790m.

2015-12-02

Cyber Threat From Within

A rogue employee can do at least as much damage as a rogue nation.

2015-12-01

The Road to Measuring and Interpreting Big Data

Think tank Demos and market research firm Ipos MORI are taking a close look at social media using big data analytic methods.

2015-12-01

Former NSA Expert ‘We are in the Cyber War’

Security mechanisms cannot keep up with the threats that both state actors and non-state actors like Anonymous are producing.

2015-12-01

Presidential Candidate John McAfee Talks Cyber

When it comes to eccentric personalities and colorful pasts, Donald Trump has nothing on John McAfee.

2015-12-01

IoT Attacks and Evasion Will Characterize 2016

The Internet of Things along with predictions of new malicious tactics & strategies will create unique challenges in 2016.

2015-12-05

IBM's CEO On Hackers: 'Cyber Crime Is The Greatest Threat To Every Company In The World'

"... cyber crime, by definition, is the greatest threat to every profession, every industry, every company in the world.”

2015-12-04

Reverse ATM Fraud: How It Works

Russian hackers have adopted a new technique, dubbed the Reverse ATM Attack to steal Millions of dollars from ATMs of financial institutions.

2015-11-27

ISIS Video Threatens US Capital

ISIS propagand video stirs up fears of a repeat 9/11 attack.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Tufin

Tufin

Tufin enables organizations to automate their security policy visibility, risk management, provisioning and compliance across their multi-vendor, hybrid environment.

International Organization for Standardization (ISO)

International Organization for Standardization (ISO)

ISO is an independent, non-governmental international standards organization. The ISO/IEC 27001 is the standard for information security management systems.

AML Solutions

AML Solutions

AML Solutions offer a full range of Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) services.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

Micro Strategies Inc.

Micro Strategies Inc.

Micro Strategies provides IT solutions that help businesses tackle digital transformation in style.

th4ts3cur1ty.company

th4ts3cur1ty.company

th4ts3cur1ty.company specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers.

Sequretek

Sequretek

Sequretek was formed with the aim to “Simplify Security”. We envision a future where enterprise networks are streamlined, secure and simple.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

Atlas Cloud

Atlas Cloud

Atlas Cloud is a UK-wide provider of managed services based in Newcastle. Our ‘research-led’ approach to IT services helps leaders make better decisions about IT for their businesses.

Aegis9

Aegis9

Aegis9 is an Australian owned and sovereign consultancy that specialises in providing tailored security solutions for both public and private sector clients based on their specific needs.

QANplatform

QANplatform

QANplatform is a Quantum-resistant hybrid blockchain platform.

WaveLink

WaveLink

WaveLink offers low risk, results-oriented Engineering Services and best-of-class Technical Support Services. Areas of expertise include cyber and security engineering.

StackGen

StackGen

StackGen (formerly appCD) automatically generates Infrastructure from Code (IfC) based on application code with golden standards applied.

Teal

Teal

Teal provides exceptional managed IT solutions for small- to medium-sized organizations that value real partnerships and elevated security.