FREE TO VIEW


« Back to News

2015-11-30

Entrepreneur’s Guide To Surviving A Tech Bubble

Venture Capital money is chasing the next tech Unicorn. As cyber security is the hot startup sector it's time to ask a few questions.

2015-11-23

Phony War: US Military To Carry Out Pretend Cyber War Against China & Russia

US lawmakers want to project more power in the newest military domain.

2015-11-23

A Spy Firm’s Price List for Secret Hacker Techniques

The zero-day broker startup Zerodium has published it's price list for different classes of digital intrusion techniques & software targets.

2015-11-23

Restricting Encryption Wouldn’t Stop Paris-Style Attacks

It’s not clear that undermining strong encryption would do anything to prevent terrorism.

2015-11-23

Britain Building Cyber Forces to Attack ISIS

Britain will bolster spending on cyber defences, simplify its state cyber structures and build its own offensive cyber capability to attack adversaries.

2015-11-23

Anonymous Acts on Cyber War Threat

Anonymous is making good on its declaration of cyber war on terrorist group ISIS.

2015-11-21

After Paris, ISIS Moves Propaganda Machine to Darknet

In a series of blog posts and messages sent to its users right after the Paris attacks, ISIS news & forums are moving entirely to the Dark Net.

2015-11-18

Thailand’s Military to Set Up New Cyberwar Unit

Thailand will establish a new group to counter growing cyber threats. The move follows plans by the ruling junta for a single Internet access point.

2015-11-18

FBI Takes Down Alert on Chip & PIN Credit Cards

The American Bankers Association are not happy about the FBI's warning to consumers on the risks on new Chip & PIN credit cards.

2015-11-18

Cybercrime: How to Recognize an Online Fraudster

The switch to Chip & PIN cards in the US is driving attempts to profile online fraudsters. The results may surprise you.

2015-11-21

Cyber War and Real War Coincide In Ukraine

The type of cyber war that the US government and military are most worried about is already in full swing in the Ukraine.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Ivanti

Ivanti

Ivanti provide user-centered IT solutions designed to increase user productivity while reducing IT security risk.

Simeio Solutions

Simeio Solutions

Simeio is a complete Identity and Access Management (IAM) solution provider that engages securely with anyone, anywhere, anytime.

United Security Providers

United Security Providers

United Security Providers is a leading specialist in information security, protecting IT infrastructures and applications for companies with high demands on security.

Asoftnet

Asoftnet

Asoftnet are specialists in IT security, IT forensics, IT service, websites, applications and mobile solutions.

Lumen Technologies

Lumen Technologies

Lumen is an enterprise technology platform that enables companies to capitalize on emerging applications and power the 4th Industrial Revolution (4IR).

Information Systems Security Partners (ISSP)

Information Systems Security Partners (ISSP)

ISSP is a specialized system integrator focused on the information security needs of its corporate clients and providing best in class products and services for securing organizational information.

The Legal 500

The Legal 500

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

Mendoza Ventures

Mendoza Ventures

Mendoza Ventures is a venture capital fund focusing on pre-seed Artificial Intelligence (AI), Fintech, and Cybersecurity startups.

R3I Ventures - House of DeepTech

R3I Ventures - House of DeepTech

The House of DeepTech is an incubator for deeptech entrepreneurs that are transforming global industries. Areas of interest include cybersecurity.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

DEKRA

DEKRA

DEKRA’s promise is to ensure the safety of human interaction with technology and the environment.

ProjectDiscovery

ProjectDiscovery

ProjectDiscovery is an open-source, cybersecurity company that builds a range of software for security engineers and developers.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.