FREE TO VIEW


« Back to News

2016-10-18

Trump Calls On US To Use Offensive Cyber Weapons

Donald Trump says the US should use offensive Cyber weapons in aggressive response to attacks from other nations.

2016-10-21

Virtual Reality - The Next Wave

Immersive technology creates empathy by putting the individual at the centre of every experience; mixed reality blends physical & digital elements.

2016-10-18

The New US President Must Win the Cyber War On Terror

America’s Cold War has become a Code War and whoever is the next US president must commit to winning the growing cyber war.

2016-10-18

The Science of Threat Intelligence

Threat intelligence is a new technique that helps security organisations recognise attack indicators and target their response fast & accurately.

2016-10-17

Indian Police In A Cyberwar

Indian Government websites are like low-hanging fruits, easy to targets for hackers due to their lack of security.

2016-10-17

Hillary Clinton Says WikiLeaks Is 'Russian Propaganda'

Clinton fires back as Wikileaks release more hacked emails, calling the website a “propaganda arm of the Russian government”. What's going on?

2016-10-17

US Security Bureau Finally Reacts To Snowden

The empty stable door is firmly bolted shut with the creation of a new US agency to protect federal data & screen out unsuitable employees.

2016-10-17

NATO’s Cyber-Capabilities Are Only Defensive

NATO's ability to respond offensively to Cyber-attacks is hindered by its previous inaction and inherent difficulties surrounding Cyber defense.

2016-10-14

US And Russia Face Off Over Syria & Cyber Attacks

Relations between the US and Russia are taking a nosedive. Will the their global cyber conflict escalate?

2016-10-14

Cyber Threats To Israel’s Air Traffic Control

Cyber-attacks on Israeli infrastructure are constant and may now include air traffic control installations.

2016-10-14

Global Cyber Security Awareness Month

Cyber security is, by its very nature, a borderless pursuit and more nations should be getting involved.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Veracode

Veracode

Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

FIRST Conference

FIRST Conference

Annual conference organised by the Forum of Incident Response and Security Teams (FIRST), a recognized global leader in computer incident response.

CloudCheckr

CloudCheckr

CloudCheckr is a next-gen cloud management platform that unifies Security & Compliance, Inventory & Utilization and Cost Management.

Eustema

Eustema

Eustema designs and manages ICT solutions for medium and large organizations.

Shadowserver Foundation

Shadowserver Foundation

Shadowserver Foundation aims to improve internet security by raising awareness of compromised servers, malicious attackers and the spread of malware.

Oxford BioChronometrics

Oxford BioChronometrics

By building profiles based on electronically Defined Natural Attributes, or e-DNA, Oxford BioChronometrics protects digital networks, communities, individuals and other online assets from fraud.

Wallarm

Wallarm

Wallarm is the only unified, best-in-class API Security and WAAP (Web App and API Protection) platform to protect your entire API and web application portfolio.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

Rezilion

Rezilion

Rezilion is a stealth mode cyber-security start-up developing a cutting edge technology that makes cloud environments self-protecting and resilient to cyber-attacks.

Fortiphyd Logic

Fortiphyd Logic

Fortiphyd Logic equips operators of the power grid, oil & gas, and other critical infrastructure with the tools and training they need to defend their industrial networks from advanced cyberattacks.

Pelion IoT

Pelion IoT

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

TPx Communications

TPx Communications

TPx is a leading managed services provider offering a full suite of managed IT, unified communications, network connectivity and security services.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.

Dapple Security

Dapple Security

Dapple Security is creating cutting edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform.