FREE TO VIEW


« Back to News

2016-09-30

‘USB Killer’ Destroys Electronic Devices

A small USB device that can destroy any electronic device into which it is plugged.

2016-09-28

Careless: NSA Hacking Tools Theft Due To Operative's 'Mistake'

How did NSA's elite Equation Group lose it's prized hacking toolbox: Russian hackers, a cunning double-bluff, or just a stupid mistake?

2016-09-28

What To Do About Zero-Day Hacks

Zero Days exploits are so called because the victim has no time to fix the vulnerability. There is a growing market to defend against such attacks.

2016-09-28

Yahoo Data Breach Questions

Yahoo recently revealed that 500 million customer accounts have been compromised, following a major data breach. What happened?

2016-09-28

Encryption Gives Malware a Perfect Place to Hide

Nearly half of cyber-attacks this year have used malware hidden in encrypted traffic to evade detection.

2016-09-27

Country Eye App For The Rural Community

Country Eye: A free App for the UK Rural and Agriculture community to capture intelligence on rural crime & report the data to Police & agencies.

2016-09-28

Hacking Elections Is Easy

In most cases, US electronic voting systems are bare-bone, decade old computer systems that lack even rudimentary endpoint security.

2016-09-28

Australia Hardest Hit By Cybersecurity Skills Shortage

Career Opportunities: The lack of cyber security professionals is felt more acutely in Australia than in any other major economy.

2016-09-26

How To Use Cybersecurity Big Data Effectively

A survey of US Federal Agencies finds that the sheer volume of cybersecurity data is overwhelming and that most of it goes unused.

2016-09-27

Internet Takes The Wheel Inside Driverless Cars

Fully automated vehicles are teetering on the edge of commercial viability. Big manufacturers and startups are piling in.

2016-09-27

Cybercrime Inc. Hackers Model Themselves On Big Business

Cybercrime is an industry involving major criminal groups, with ecosystems as well-structured as the corporations they are attempting to target.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clifford Chance

Clifford Chance

Clifford Chance are one of the world's pre-eminent law firms with resources across five continents. Practice areas include Cyber Security & Information Protection

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

Towergate Insurance

Towergate Insurance

Towergate Insurance is a leading UK specialist insurance broker. Business products include Cyber Liability Insurance.

AllegisCyber Capital

AllegisCyber Capital

AllegisCyber is an investment company with a focus on seed and early stage investing in cybersecurity and its applications in emerging technology markets.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

SecureStack

SecureStack

SecureStack helps software developers find security & scalability gaps in their web applications and offers ways to fix those gaps without forcing those developers to become security experts.

OWN

OWN

OWN (formerly SEKOIA) is a major French player in cybersecurity providing tailor-made, informed and adapted cyber support thanks to its DNA of passionate and committed experts.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

GuardDog.ai

GuardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

Gridware

Gridware

Gridware is a specialised cybersecurity consultancy firm and an emerging global player in the cybersecurity intelligence and advisory field.

Clearnetwork

Clearnetwork

Clearnetwork specializes in managed cybersecurity solutions that enable both public and private organizations improve their security posture affordably.

AI Spera

AI Spera

AI-Driven Cyber Threat Intelligence Security. AI Spera provides real-time intelligence to empower your security competences in all aspects of the business.

IT Solutions Consulting

IT Solutions Consulting

IT Solutions is a full-service IT partner providing managed services and other information technology solutions nationwide.