News

2015-07-20

Cyber Vulnerability Report 2015

The Insurance industry & their customers need a better understanding of internal security and the different types of insurance available.

2015-06-02

NSA Powers Expire as US Rolls Back Surveillance

The US Senate has not extended the expiring surveillance provisions of the Patriot Act, leaving the U.S. intelligence community without vital tools.

2015-06-01

Edward Snowden Answers Some Questions

With a little help from his friends at the American Civil Liberties Union, Edward Snowden conducted a Reddit "Ask Me Anything" session.

2015-06-01

US Needed Snowden to Open the Door on NSA’s Spying

Snowden shouldn’t have been necessary.

2015-06-01

"Torus" Reveals an Expansion in 5 Eyes Surveillance.

A great eavesdropping expansion has been taking place in plain sight.

2015-06-01

Finland Could Reshape Cyber Law

The world needs a fluid and frank dialogue among states, the private sector & civil society to guarantee the security of cyberspace.

2015-06-01

North Korean Hackers 'could kill', Warns Defector

North Korean hackers are capable of attacks that could destroy critical infrastructure and kill people.

2015-06-03

Hackers Build New Tor Client Designed to Beat the NSA

A new Tor client called Astoria designed specifically to make eavesdropping harder for the world's richest, most aggressive & most capable spies.

2015-06-04

Review of Organised Cyber Crime

Comparison of Criminal Groups in Cyberspace

2015-06-03

Keeping Passwords Safe From Cracking

Researchers have come up with an effective & easy-to-implement solution for protecting passwords from attackers.

2015-06-01

Hacker’s Into Commercial Airline Systems

Potential vulnerabilities in the US’s pending shift to satellite-based air traffic control from current ground-based systems.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Solarflare

Solarflare

Solarflare is a leading provider of intelligent networking I/O software and hardware platforms that accelerate, monitor and secure network data.

ZyberSafe

ZyberSafe

ZyberSafe is an innovative Danish company specialized within building hardware encryption solutions.

Dcoya

Dcoya

Dcoya's complete security awareness training program gives you out-of-the-box compliance with PCI-DSS, HIPAA, SOX and ISO regulations.

NAVEX Global

NAVEX Global

NAVEX Global’s compliance management system consolidates your entire GRC program onto a scalable cloud-based platform.

Blake, Cassels & Graydon (Blakes)

Blake, Cassels & Graydon (Blakes)

Blakes is one of Canada’s top business law firms serving national and international clients in specialist areas including cyber security.

Gospel Technology

Gospel Technology

Gospel presents a totally new way of accessing and controlling data which is enterprise grade scalable, highly resilient, and secure.

Cyber Security & Cloud Expo

Cyber Security & Cloud Expo

The Cyber Security & Cloud Expo is an international event series in London, Amsterdam and Silicon Valley.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

David Hayes-Export Controls

David Hayes-Export Controls

David Hayes-Export Controls provides assistance to companies affected by export controls or who are considering entering the market but are unsure of the commercial and regulatory implications.

KnectIQ

KnectIQ

Building Trust Environments in a Zero-Trust World. KnectIQ offers KIQAssure, an Ultra High Security Solution for Data in Flight.

Cognyte

Cognyte

Cognyte is a global leader in investigative analytics software that empowers a variety of government and other organizations with Actionable Intelligence for a Safer World.

National Institute for Research & Development in Informatics (ICI Bucharest) - Romania

National Institute for Research & Development in Informatics (ICI Bucharest) - Romania

ICI Bucharest is the most important institute in the field of research, development and innovation in information and communication technology (ICT) in Romania.

Cyber Unit

Cyber Unit

Cyber Unit offer next level protection from cyber attacks in packages and pricing options that are accessible to smaller organizations.

Circle Security

Circle Security

Circle’s breakthrough security API unifies solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their applications.

Amplix

Amplix

In the race to create value for your enterprise, Amplix is your best asset for making technology decisions and optimizing your IT infrastructure, cloud usage, and security posture.

Token

Token

Token is changing the way our customers secure their organizations by providing passwordless, biometric, multifactor authentication.