News

2015-11-21

Cyber War Games: ‘Too Little Too Late’

Financial centres in London and New York are to be hit with a simulated cyber-attack later this month.

2015-11-21

7 Things You Need to Know About Car Hacking

Car hacking is real and likely to happen much more regularly in the future. Top facts you need to know about this emerging trend.

2015-11-21

Internet of Things will drive the Digital Revolution of Industry

Increased connectivity is going to change the way we communicate and do business.

2015-11-16

UK Banks Face Cyber Security Stress Test - Operation Resilient Shield

UK financial institutions' CIO's will feel the heat as the Bank of England rolls out it's new war-game to test the cyber-resilience of the financial sector.

2015-11-19

Where Next? Paris Attacks Show Mumbai Strikes Are Global Blueprint

The response to global terrorism is far from united. As India has shown, getting two premier security agencies to cooperate is a challenge.

2015-11-11

Essential Cyber Security Tips to Stay Safe Travelling

Travel Advisory: Make sure your cyber security best practices are coming along for the ride.

2015-11-11

Energy Under Hacktivist Threat

The FBI say that politically motivated Hackers are the second biggest threat to the U.S Energy sector, after it's own employees.

2015-11-11

Who Is In Charge if a Massive Cyber Attack Strikes the U.S?

Large scale cyber attacks on infrastructure may be unlikely, but if it happens, the chain of command is far from clear.

2015-11-13

EU votes Snowden Human Rights Asylum

MEPs last week voted Edward Snowden should be granted asylum in Europe on the grounds that he is a “defender of human rights.”

2015-11-12

MI5 Relies on Hacking

The British spy agency says it has “relied” on hacking techniques in “the overwhelming majority of high priority investigations" over the past year.

2015-11-12

The Dark Side of the Fourth Industrial Revolution – and How To Avoid It

With the Fourth Industrial Revolution and its promise of technological progress, comes a dark reality. Opinion By Espen Barth Eide and Anja Kaspersen

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cloud Foundry Foundation (CFF)

Cloud Foundry Foundation (CFF)

Cloud Foundry supports the full application development lifecycle, from inception, through all testing stages, to deployment.

Avanan

Avanan

Avanan is The Cloud Security Platform. Protect all your SaaS applications using tools from over 60 industry-leading vendors in just one click.

Medigate

Medigate

Medigate is a dedicated medical device security platform protecting all of the connected medical devices on health care provider networks.

LSEC

LSEC

LSEC is a global innovator and facilitator for the Cybersecurity industry. It is a non-profit membership organisation supporting further maturing the industry through its end users.

Augusta HiTech

Augusta HiTech

Augusta Hitech is a focused product development, software services and technology consulting company. Our Vision is to become the most socially impactful and innovative technology company in the world

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

Binare

Binare

Binare empowers companies all over the world to improve their IIot/IoT /Embedded cybersecurity posture and digital privacy.

Morpheus Enterprises

Morpheus Enterprises

Morpheus Enterprises offer managed security solutions designed to keep your web applications secure and your business running smoothly.

NexGen Cyber

NexGen Cyber

NexGen Cyber helps customers in commercial SMB markets with IT security, security integration, service management, outsourced service transition, and transformative security solutions.

Corsearch

Corsearch

Combining AI-powered technology and decades of industry expertise, Corsearch is revolutionizing how companies establish and protect their brands.

Cypfer

Cypfer

CYPFER is a global market leader in ransomware post-breach remediation and cyber-attack first response.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.

Southern Cyber

Southern Cyber

At Southern Cyber, our mission is to deliver world-class information security solutions that align businesses with leading security frameworks and compliance standards.

Monokee

Monokee

Monokee offers a solution that seamlessly integrates powerful Identity and Access Management (IAM) capabilities with a low/no code identity orchestrator.