FREE TO VIEW


« Back to News

2015-12-18

Third of UK Finance Logins Risk Client Data

Many industry personnel are not assigned unique login and password details, resulting in the risk of customer's personal and financial data.

2015-12-21

Email Data Breaches: The Threat Keeps Giving

2015 - A year of unprecedented data breaches. Major government agencies & consumer sites were hacked, millions of users were compromised.

2016-01-08

What Does a Cyber Security Strategy Look Like?

The top management and board of directors should own cyber security, its implementation and response.

2015-12-18

Facebook Rule Change After Privacy Ruling

Facebook is locking people out of its site unless they are registered users, following a Belgian privacy ruling.

2015-12-14

Can Surveillance Drones Prevent the Next Kunduz?

Basic communications failures in contributed to a tragedy in which more than 30 people died at Kunduz, in Afghanistan,

2015-12-16

Can Big Data Help Climate Change?

The Earth is big and its climate is complicated. To understand it, scientists turn to big, complicated climate simulations that run on supercomputers.

2015-12-16

Encrypt A Message In the Big Bang Afterglow

If you’ve got a secret you need to keep safe, look toward the skies. Physicists propose using the afterglow of the big bang to make encryption keys.

2015-12-28

The True Cost of Surveillance

New legislation to regulate spying in the UK seeks to combine numerous existing powers and make them all subject to coherent oversight.

2015-12-15

Malware Mixed Into A Cyber Threat Cocktail

On The Rocks: Cybercrime group combines Pony, Angler and CryptoWall 4.0 in a single campaign slammer.

2015-12-15

Cyber Warfare: An Integral Part of Modern Politics

Cyber-operations are being used for a wide range of information warfare & intelligence gathering purposes, according to NATO.

2015-12-14

The Future Of Healthcare Systems Is ‘Unsexy Plumbing’

The technology companies that can get data integration right will be healthcare’s true change-makers.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Ascentor

Ascentor

Ascentor specialises in independent information and cyber security consultancy. We’re experienced industry experts, providing cyber security services since 2004.

Assuria

Assuria

Assuria Cyber Security solutions provide protective monitoring of systems and user activity across the whole IT infrastructure.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

Modulo Security

Modulo Security

Modulo provides automated Governance, Risk, and Compliance (GRC) solutions.

Enigmatos

Enigmatos

Enigmatos is an Israeli based Automotive Cyber Security company. We provide solutions to the ever growing threat of vehicle hacking.

ThriveDX

ThriveDX

ThriveDX, the world’s premier EdTech provider (formerly HackerU), champions digital transformation training as a means of empowering individuals to thrive in the age of digital disruption.

McDonald Hopkins

McDonald Hopkins

McDonald Hopkins is a business advisory and advocacy law firm. We focus on insightful legal solutions that help our clients strategically plan for an increasingly competitive future.

rSolutions

rSolutions

rSolutions delivers managed cybersecurity services to clients in many industry sectors including financial services, telecommunications, energy, government and retail.

Spera Security

Spera Security

Spera helps identity security professionals effectively and confidently measure, prioritize and reduce identity risk to better protect the organization from identity-based attacks.

Certera

Certera

Certera is a modern and affordable SSL Certificate, Code Signing Certificate, and Cyber Security Services provider.

Anzen Technology Systems

Anzen Technology Systems

Anzen create software solutions which allows organisations to utilize the public cloud for sensitive or classified information, whilst increasing data security and retaining data sovereignty.

Synagex

Synagex

Synagex Modern IT is a simple IT and cybersecurity solution for businesses.

CyberSecAsia

CyberSecAsia

CyberSecAsia series conference is the one and only decision-makers gathering for CISO and info security experts in Asia.

Scality

Scality

Scality storage unifies data management from edge to core to cloud. Our market-leading file and object storage software protects data on-premises and in hybrid and multi-cloud environments.

LevelBlue

LevelBlue

LevelBlue simplify cybersecurity through award-winning managed security services, experienced strategic consulting, threat intelligence and renowned research.

Genix Cyber

Genix Cyber

Genix Cyber provides world-class cybersecurity services that protect systems, cloud applications, infrastructure, critical data, and networks from evolving cyber threats.