News

2015-04-22

Russia's Cyber Attacks Grow More Brazen

Russia has ramped up cyber attacks against the United States to an unprecedented level.

2015-04-16

China’s Cyber Attacks on Governments and Corporates in Asia

The Chinese government is accused of being behind a newly discovered set of cyber attacks across Southeast Asia over the past ten years.

2015-04-22

NSA’s Plan to Snowden-Proof Data Using the Cloud

With NSA’s widespread adoption of cloud-based computing, the spy agency has made a big technology bet.

2015-04-22

The Internet Connected Car

By 2020 BI Intelligence estimates that 75% of cars shipped globally will be connected.

2015-04-21

Planes Without Pilots

The Centaur Optionally Piloted Aircraft can be operated unmanned or with pilots on board.

2015-04-22

Wi-Fi on Planes is Vulnerable to Inflight Hacking

Hackers on commercial flights could now bring down the plane they are on by using the on board Wi-Fi.

2015-04-17

Cloud-based Business Intelligence Goes Mainstream

More than 50 percent of businesses currently use or plan to use cloud-based business intelligence.

2015-04-17

Cybercrime More Profitable Than Drug Trading

Total Global Impact of Cybercrime is US$3 Trillion, making it more profitable than the global trade in marijuana, cocaine & heroin combined.

2015-04-16

Insurance Experts Say Adequate Cyber Cover Is Now Available.

Cyber insurance is becoming broader and more affordable, although it's worth shopping around for the right policy.

2015-04-14

French Media’s Emergency Meeting After Isis Hack

Crisis: All TV5Monde broadcasts were brought down in a blackout by hackers claiming allegiance to Isis.

2015-04-15

Snowden’s HBO Interview: Has He Actually Read The NSA Documents He Leaked?

Snowden tells HBO that he hadn’t thoroughly looked at the sensitive documents before leaking them, knowing they were “harmful”.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

Nutanix

Nutanix

The Nutanix enterprise cloud platform provides performance, robust security, and seamless application mobility for a broad range of enterprise applications.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

Graphus

Graphus

Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

ITRenew

ITRenew

ITRenew is a leading global IT lifecycle management solutions company, specializing in onsite data center decommissioning and data erasure services.

Cloudrise

Cloudrise

Cloudrise are elevating cloud security, data protection, and privacy through assessment, technology enablement, and process automation.

CyFIR

CyFIR

CyFIR is a network investigation and Incident Response tool for performing live computer investigations across any size enterprise.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

Data Privacy Office (DPO)

Data Privacy Office (DPO)

Data Privacy Office is a company that specializes in privacy and personal data protection, following the highest standards in its sector.

OSIbeyond

OSIbeyond

OSIbeyond provides comprehensive Managed IT Services to organizations in the Washington D.C., MD, and VA area including IT Help Desk Support, Cloud Solutions, Cybersecurity, and Technology Strategy.

DigitalWell

DigitalWell

DigitalWell provide fully managed IT and communications solutions for a truly innovative end-to-end experience - for your customers and teams.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

ANSSI Burkina Faso

ANSSI Burkina Faso

ANSSI is responsible for managing the security of information systems and cyberspace in Burkina Faso.