FREE TO VIEW


« Back to News

2016-05-20

Related Aspects Of A Breach: Impact Of Partners & Suppliers

Analysis of the giant breach at retailer Target shows that business partners and suppliers can spell big trouble for an organization’s security.

2016-05-20

Vulnerable Australia Boosts National Cyber Security

Australia introduces a multi-million-dollar national cybersecurity policy to combat hacking but stops short of blaming recent attacks on China.

2016-05-23

Healthcare Execs Credit IT With Improving Care

Healthcare managers say the cost savings and interoprability benefits of improved IT systems outweigh the security concerns.

2016-05-23

Unified Cyber Command To Help US React Faster

Defense leaders are contemplating elevating US CyberCom to a full-fledged unified command.

2016-05-20

Enhanced Attribution Program To Identify & Track Hackers Worldwide

Pentagon researchers want to consistently identify virtual personas and individual malicious cyber operators across different endpoint devices.

2016-05-18

'Guccifer' Claims He Got Inside Hillary Clinton's Server

Romanian hacker claims to have gained access to the former US Secretary of State's Clinton's "completely unsecured" server.

2016-05-16

Bank Launches Big Data Insight Product For SMEs

A new online service to provide insights and deeper analysis of customer transactions and highlight behaviour and spending patterns.

2016-05-13

Swiss Defense Ministry Targeted

Russian hackers suspected of industrial espionage.

2016-05-13

Can FinTech Supersede Financial Services Workers?

The world of finance is being transformed by emerging technologies, and that will mean lots of lost jobs.

2016-05-13

Tech Jobs Would Be Great, If It Wasn’t For The Users

IT jobs would be so much better if they didn’t have to deal with other people.

2016-05-13

Exposing Cybercrime As A Business Model

Trustwave reveal how sophisticated criminal organizations are most likely to attack, and more importantly, how potential victims can defend their assets

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Mobile Mentor

Mobile Mentor

Mobile Mentor is an independent provider of enterprise mobility solutions in New Zealand and Australia.

Egerie

Egerie

EGERIE's RiskManager solution provides a Global, Centralized, and Updated view of risk maps and security measures for your company.

Saviynt

Saviynt

Saviynt is a leading provider of Cloud Security and Identity Governance solutions.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

Georgia Cyber Center

Georgia Cyber Center

Georgia Cyber Center is dedicated to training the next generation of professionals through education and real-world practice while also supporting innovation in new technologies for online defenses.

Incognito Forensic Foundation Lab (IFF Lab)

Incognito Forensic Foundation Lab (IFF Lab)

IFF Lab is a premier cyber and digital forensics lab in India that offers forensic services and solutions, cyber security analysis and assessment, IT support, training and consultation.

Sweepatic

Sweepatic

The Sweepatic reconnaissance platform discovers and analyses all internet facing assets and their exposure to risk.

Digital Magics

Digital Magics

Digital Magics is an incubator for innovative startups which offer content and services with high technological value. Areas of focus include IoT, Enterprise Software, AI, Industry 4.0 and Blockchain.

Sayata Labs

Sayata Labs

Sayata delivers a streamlined solution for processing cyber policies. Increase profitability with an easy and intuitive platform.

CybX Security LLC

CybX Security LLC

CybX is the first company of its kind to merge the practice of computer forensics with computer security and information security.

Calyptix Security

Calyptix Security

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology.

Global Cyber Risk (GCR)

Global Cyber Risk (GCR)

Global Cyber Risk is a technology and advisory services firm that provides first tier cybersecurity services to both large corporations and small and mid-sized businesses.

InterGuard

InterGuard

As the pioneer for Unified Insider Threat Prevention and productivity monitoring tools, InterGuard offers on premise and SaaS-based services that are easily available and affordable.

DNX Ventures

DNX Ventures

Based in Silicon Valley and Tokyo, DNX Ventures is an early stage VC for B2B startups in sectors including Cybersecurity.

Grindstone Ventures

Grindstone Ventures

Grindstone Ventures is a post-seed fund that supports post-seed equity and quasi-equity investments in early-stage innovation-driven and/or technology companies.

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.