FREE TO VIEW


« Back to News

2015-07-20

Cyber Vulnerability Report 2015

The Insurance industry & their customers need a better understanding of internal security and the different types of insurance available.

2015-06-02

NSA Powers Expire as US Rolls Back Surveillance

The US Senate has not extended the expiring surveillance provisions of the Patriot Act, leaving the U.S. intelligence community without vital tools.

2015-06-01

Edward Snowden Answers Some Questions

With a little help from his friends at the American Civil Liberties Union, Edward Snowden conducted a Reddit "Ask Me Anything" session.

2015-06-01

US Needed Snowden to Open the Door on NSA’s Spying

Snowden shouldn’t have been necessary.

2015-06-01

"Torus" Reveals an Expansion in 5 Eyes Surveillance.

A great eavesdropping expansion has been taking place in plain sight.

2015-06-01

Finland Could Reshape Cyber Law

The world needs a fluid and frank dialogue among states, the private sector & civil society to guarantee the security of cyberspace.

2015-06-01

North Korean Hackers 'could kill', Warns Defector

North Korean hackers are capable of attacks that could destroy critical infrastructure and kill people.

2015-06-03

Hackers Build New Tor Client Designed to Beat the NSA

A new Tor client called Astoria designed specifically to make eavesdropping harder for the world's richest, most aggressive & most capable spies.

2015-06-04

Review of Organised Cyber Crime

Comparison of Criminal Groups in Cyberspace

2015-06-03

Keeping Passwords Safe From Cracking

Researchers have come up with an effective & easy-to-implement solution for protecting passwords from attackers.

2015-06-01

Hacker’s Into Commercial Airline Systems

Potential vulnerabilities in the US’s pending shift to satellite-based air traffic control from current ground-based systems.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

iTrinegy

iTrinegy

iTrinegy is a world leader in Application Risk Management offering solutions to mitigate all networked application deployment risks

Cybellum

Cybellum

Cybellum brings the entire product security workflow into one dedicated platform, allowing device manufacturers to keep the connected products they build cyber-secure and cyber-compliant.

FFRI Security

FFRI Security

FFRI is committed to research and development of preventing the most advanced cyber-attacks and breaches.

Banshie

Banshie

Banshie is an independent cyber security company with a small team of recognized specialist that are among the best in their field.

DarkOwl

DarkOwl

DarkOwl provides the world’s largest index of darknet content and the tools to efficiently find leaked or otherwise compromised sensitive data.

Corsha

Corsha

Corsha is on a mission to simplify API security and allow enterprises to embrace modernization, complex deployments, and hybrid environments with confidence.

Sovrin Foundation

Sovrin Foundation

The Sovrin Foundation is a private-sector, international non-profit that was established to govern the world's first self-sovereign identity (SSI) network.

Opticks Security

Opticks Security

Opticks provides fraud detection and monitoring solutions for leading brands. agencies and networks. Our relentless mission is to deliver reliable and innovative software to beat digital fraud.

Infuse Technology

Infuse Technology

Infuse Technology provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

LimaCharlie

LimaCharlie

LimaCharlie gives security teams full control over how they manage their security infrastructure. Get full visibility, build what you want, control your data, get the security capabilities you need.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

NXM Labs

NXM Labs

NXM is a leader in a leader in advanced cybersecurity software for connected devices.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

EVVO LABS

EVVO LABS

EVVO Labs empower your business with the latest IT capabilities to get you ahead of your competitors. We are experts at converging technologies to build your digital transformation.

Sherweb

Sherweb

Sherweb are a marketplace of leading cloud solutions and value-added services delivered by a team of passionate experts invested in MSP growth.