FREE TO VIEW


« Back to News

2016-08-09

Cybersecurity Issues Are M&A Deal Breakers

M&A experts warn that due-diligence audits of companies targeted for acquisition often reveal cybersecurity risks that compromise compliance.

2016-08-09

Insider Trading: Ukrainian Hackers Accomplice Pleads Guilty

US stockbroker pleads guilty to conspiracy for his role in an insider-trading ring that reaped millions of dollars in illicit profits.

2016-08-09

Mobile Battery Tracks You Online

A little-known web standard that lets site owners tell how much battery life a mobile device has left has been found to enable tracking online.

2016-08-08

Brexit Leading To Rising Tide Of Cyber Scams

Economic uncertainty following the Brexit vote is creating the perfect conditions for cyber-fraud

2016-08-07

EU Cyber Crime Commissioner is King

Post Brexit Vote: Briton becomes EU commissioner for the 'security union' to develop European security and counter-terrorism plans.

2016-08-04

Clinton Campaign Confirm Mystery Hackers Accessed Data

Is Russia using hackers to influence the outcome of the US Presidential election and is the US using proxies to retaliate?

2016-08-03

Russian Government Under Multiple Cyber Attack

A "professional" cyber-attack has hit Russian government bodies, says the country's domestic intelligence service (FSB).

2016-08-03

The End Of Your Undivided Attention

Many things have sought to capture your undivided attention, but that might be the ghost of a goal in today’s multichannel & multimedia reality.

2016-08-05

Data Protection Tips for Proposed US Cybersecurity Laws

Proposed new US cybersecurity legislation is making many businesses nervous. These tips will help you be prepared.

2016-08-05

Key Trends In Machine Learning & Artificial Intelligence

While there is agreement on the importance of machine learning, few companies have adequate expertise to get the technology to do what they want.

2016-08-07

Companies See Cyber Threats But Can’t Deal With Them

As the risk of cyber-crime intensifies, most large organizations are still not prepared to deal with the onslaught of digital attacks.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Identiv

Identiv

Identiv is a global security technology company that establishes trust in the connected world, including premises, information and everyday items.

CERT.at

CERT.at

CERT.at is the Austrian national Computer Emergency Response Team.

TWNCERT

TWNCERT

TWNCERT is the National Computer Emergency Response Team of Taiwan.

XBOSoft

XBOSoft

XBOSoft is a software QA and testing company. We cover the entire QA and testing life cycle including software and application security.

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

Cybercrime Investigation & Coordinating Center (CICC)

Cybercrime Investigation & Coordinating Center (CICC)

The Cybercrime Investigation and Coordinating Center (CICC) is an attached agency of the Philippines Department of Information and Communications Technology (DICT).

Information & eGovernment Authority (iGA) - Bahrain

Information & eGovernment Authority (iGA) - Bahrain

The Information & eGovernment Authority facilitates many services catering to different parts of the community within the IT sector in Bahrain including information security.

Venrock

Venrock

Venrock helps entrepreneurs build some of the world's most disruptive, successful companies. We invest in technology: Security, Cloud Services, Big Data, Healthcare IT, AdTech.

Bradley-Morris

Bradley-Morris

Bradley-Morris is a leading recruiting firm specializing in transitioning military and veteran talent into civilian careers including Cybersecurity.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

Objectives of the ISA Global Cybersecurity Alliance include the acceleration and expansion of standards, certification, education programs, advocacy efforts, and thought leadership.

Quantum Star Technologies

Quantum Star Technologies

Quantum Star Technologies has developed Starpoint to be a next-next-generation solution to cyber security threats. Our mission is to secure the online world through our patented technology.

Verica

Verica

Verica uses chaos engineering to make systems more secure and less vulnerable to costly incidents.

CyberUSA

CyberUSA

CyberUSA is a collaboration of leaders and states focused on a common mission purpose of enabling innovation, education, workforce development, enhanced cyber readiness and resilience.

Winmill Software

Winmill Software

Winmill is a technology services company that provides expert consulting services in Application Development, Application Security and Cyber Security.

ITButler e-Services

ITButler e-Services

At IT Butler, our mission is crystal clear: we are dedicated to providing top-tier cybersecurity solutions and best-practice methodologies to secure and enhance your digital infrastructure’s resilienc

NetBird

NetBird

NetBird combines a WireGuard-based overlay network with Zero Trust Network Access, providing a unified platform for reliable and secure connectivity.