News

2015-10-12

GCHQ Can Hack My Smartphone Using a Bunch of Smurfs

Dreamy, Nosey, Tracker and Paranoid - the unlikely team of GCHQ avatars that can power remote surveillance & control of mobile phones.

2015-10-09

Safe Harbour No More. Facebook Data Transfer Deal Is Ruled Invalid

EU Court of Justice rule the 'Safe Harbour' agreement that companies have relied on to move personal data across the Atlantic is invalid.

2015-10-08

Snowden : Smartphones Can Be Remotely Controlled

Smartphone users can do "very little" to stop security services getting "total control" over their devices, says Edward Snowden.

2015-10-07

The Rules of Cyberspace Just Got A Bit Clearer

United Nations has made recommendations guiding state activity in cyberspace which break new ground.

2015-10-07

Where’s The Money in Data?

How do we use data to drive revenue?

2015-10-12

Cyber Insurance Policies: Worth the Money?

The global cyber insurance market is expected to triple in size, reaching an estimated $7.5 billion in annual premiums by the year 2020.

2015-09-18

Bitcoin Made Official by US Trade Commission

The US Commodity Futures Trading Commission has ordered that bitcoin be treated as an official commodity and regulated accordingly.

2015-10-12

Should US Hacked Federal Employees Lose Security Clearance?

At least one federal chief information security officer is concerned about how frequently senior federal employees fall for the bogus emails.

2015-10-09

These Facts Explain the Threat of Cyber Warfare

Five factors explain the evolution of cyber warfare, its astronomical costs and its increasingly important role in geopolitics.

2015-10-07

21 Announces the Bitcoin Computer

Buying and running a bitcoin miner just got a little easier. And there is a micropayment capability included.

2015-10-07

Hackers Burrow Into Apple's Walled Garden

The walled garden has a rather nasty infestation. Several Chinese apps were discovered to contain code that could steal user information.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cybersecurity Advisors Network (CyAN)

Cybersecurity Advisors Network (CyAN)

CyAN provides a not-for-profit platform that helps private and public organisations as well as governments to identify trusted advisors in the area of Cyber Security and Cyber Crime.

Wüpper Management Consulting (WMC)

Wüpper Management Consulting (WMC)

Specialized in compliance, risk management and holistic information security WMC GmbH has longtime implementation experience in global projects.

Cybersecurity Collaboration Forum

Cybersecurity Collaboration Forum

The mission of the Cybersecurity Collaboration Forum is to foster information security communication and idea sharing across the C-Suite, enabling leaders to better protect their enterprises.

Blueskytec (BST)

Blueskytec (BST)

Blueskytec has applied its experience of over three decades of working in the field of embedded systems and encryption to provide a scalable and appropriate technology for cyber-physical devices.

DigiByte (DGB)

DigiByte (DGB)

DigiByte (DGB) is a rapidly growing global blockchain with a focus on cybersecurity for digital payments & decentralized applications.

LogicHub

LogicHub

LogicHub is built on the principle that every decision process for threat detection and response can and should be automated.

BIO-key

BIO-key

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions.

Xopero Software

Xopero Software

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data.

CloudCover

CloudCover

CloudCover is a software-defined cybersecurity risk solution that provides risk awareness, risk analytics, and data security in real time.

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies offer an advanced innovation for AI security. The Bosch AIShield is the definite answer to safeguard your business against model extraction attacks.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

Allstate Identity Protection

Allstate Identity Protection

Allstate make it easy to provide complete identity protection, so everyone can live more confidently online.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Accompio

Accompio

Accompio offer comprehensive support in the digitalisation of your business processes.

Liquid C2

Liquid C2

Liquid C2 offers leading solutions to streamline workplace operations, secure cloud storage, rapid data recovery, and scale growth.

Security Mind

Security Mind

Security Mind is an innovative Cyber Security Awareness program that aims to increase the awareness of each member of the organization and develop the ability to recognize potential cyber threats.