News

2015-07-10

Data Scientist: The Sexiest Job of the 21st Century

Automated solutions, whether hardware or software, are getting cheaper, faster & more versatile at an ever-increasing rate.

2015-07-10

UK Police 'Skim the Surface' of Cybercrime

Britain's top cop says the UK Police are falling well short in their efforts to tackle cybercrime.

2015-07-10

Security Warning To Airlines of New Cyber Attacks

Huge risks and challenges facing the airlines.

2015-07-09

VP of Marketing

To establish Kudelski Security as a Global thought leader in Cyber Security.

2015-07-07

UK’s Home Secretary named Internet Villain

Crowned 'Internet Villain' of the year by the Internet Service Providers Association, one of the UK's biggest Internet lobbying groups.

2015-07-07

Why Police Agencies Can't Communicate in a Crisis

Incompatible communications systems, databases and priorities in the U.S. Too little technical know-how in the U.K.

2015-07-07

ICWATCH Database Gathers the CV’s of 27,000 Intelligence Employees

The Open Source ICWATCH database of intelligence community workers is fully searchable.

2015-07-10

Cyber Security in China: New Challenges to the West

China’s Internet & telecoms giants are very successful but the Chinese IT market is getting more challenging for western businesses.

2015-07-07

Offensive Cyber Security Changes the Industry

Opinion byMatthew Rosenquist

2015-07-07

NSA: 'Backdoors are a Bad Idea - Give us a Front Door Key'

The idea seems to be that only when all the agencies holding portions of a key decide to use it together will decryption become possible.

2015-07-07

‘Great Cannon’ China’s Weapon Shoots Down Internet Sites

‘Great Cannon’ is a powerful tool built to intercept data and redirect it to specific websites.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

A10 Networks

A10 Networks

A10 Networks is a leader in application networking, helping organizations of all sizes to accelerate, optimize and secure their applications.

Axiomatics

Axiomatics

Axiomatics provides dynamic authorization and access control solutions to protect critical data assets.

Redcentric

Redcentric

Redcentric is a leading UK IT managed services provider. We deliver managed IT, cloud computing, data backup, information security services and managed networks.

MIT Internet Policy Research Initiative (IPRI)

MIT Internet Policy Research Initiative (IPRI)

IPRI's mission is to work with policy makers and technologists to increase the trustworthiness and effectiveness of interconnected digital systems

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

SafeLogic

SafeLogic

SafeLogic provides strong encryption products for solutions in mobile, server, Cloud, appliance, wearable, and IoT environments that are pursuing compliance to strict regulatory requirements.

Innova

Innova

Innova is Turkey's leading IT solutions company, providing platform independent solutions to organizations in telecommunication, finance, production, public and service sectors.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

NDK InfoSec

NDK InfoSec

NDK InfoSec is a specialist Information Security and Cyber Security search firm. We're not just a security function in a larger generalist recruitment company.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

NAK Consulting Services

NAK Consulting Services

NAK is helping organisations to create Secure, Agile IT Environments. Our goal is to be the trusted advisor and managed service partner for our clients.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

Aquia

Aquia

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges.

SureCloud Cyber Services

SureCloud Cyber Services

Our Cyber Testing capability has been honed since we were founded in 2006 as a disrupter in the penetration testing market.

Texaport

Texaport

Texaport's vision is to be the trusted partner of choice for organisations seeking comprehensive IT management and cutting-edge security solutions.