FREE TO VIEW


« Back to News

2015-05-26

US Cyber Security Insurance Developments

US insurance regulators have increased their scrutiny of cyber security measures taken by insurance companies.

2015-05-24

Silicon Valley a Major Player in Cyberwarfare

US Department of Defense will provide venture capital funding to startups that can help the Pentagon develop more advanced cybersecurity.

2015-05-27

Cyber Crime on a Global Scale

Cyber crime is ubiquitous, from intercepting your car's bluetooth, to using apps & the Internet to steal private details of millions of citizens.

2015-05-22

FBI Director says ISIS Could Cyberattack the US

ISIS is “waking up” to the idea of using sophisticated malware to cyberattack critical infrastructure in the US.

2015-05-22

UK Rewrites Hacking Laws to Give GCHQ Immunity

Changes to the Computer Misuse Act were secretly introduced over a year ago.

2015-05-22

Device to protect your vehicle from “Sticky bombs”

’Advanced Car Protection’ will detect any hidden device placed under a parked car and will issue an alert in real time.

2015-05-22

Snowden Sees Victory – But it’s From a Distance

For an international fugitive hiding out in Russia from American espionage charges, Edward J. Snowden gets around.

2015-05-22

German BND Intelligence Cooperation with NSA has Actually Expanded.

German and US intelligence agencies are cooperating on a scale and in ways that are only now becoming apparent.

2015-05-19

Nine Strange Flying Robots from the 2015 Drone Show

The future of drone design is an area with huge importance for companies and for the military. At the recent Unmanned Systems 2015 Show that future was on display.

2015-05-19

US Colleges Open Networks in a Cyberwar

A string of attacks that attempt to exploit weaknesses that are unique to the way colleges operate.

2015-05-22

Countering Cyber Criminals with Biometrics

Biometrics, Smartphones, fingerprint readers; the financial services sector is beginning to to invest in new security measures.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Open Networking Foundation (ONF)

Open Networking Foundation (ONF)

The Open Networking Foundation (ONF) is a non-profit operator led consortium driving transformation of network infrastructure and carrier business models.

CyberWarrior

CyberWarrior

CyberWarrior deliver training and consulting for some of the world’s top brands and also partner with national systems integrators to augment their teams with our expertise.

Security University

Security University

Security University is a leading provider of Qualified Hands-On Cybersecurity Education, Information Assurance Training and Certifications for IT and Security Professionals.

Center for Long-Term Cybersecurity (CLTC)

Center for Long-Term Cybersecurity (CLTC)

The Center for Long-Term Cybersecurity is developing and shaping cybersecurity research and practice based on a long-term vision of the internet and its future.

Certis

Certis

Certis is a leading advanced integrated security organisation that develops and delivers multi-disciplinary security and integrated services.

FraudWatch International

FraudWatch International

FraudWatch has been protecting client brands around the world since 2003, and are the leaders in online brand protection from phishing, malware, social media and mobile apps impersonation.

TalaTek

TalaTek

TalaTek is a full-service risk management firm providing expert services in risk management, cybersecurity, and compliance.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

Prime Technology Services

Prime Technology Services

Prime Tech are a group of Red Hat, Microsoft & Cisco Certified IT Professionals with an impressive track record of consistently delivering value to our corporate clients.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

HWG Sababa

HWG Sababa

HWG Sababa is a cybersecurity provider that offers a comprehensive suite of strategic managed security solutions, services, and consultancy.

HIFENCE

HIFENCE

HIFENCE delivers cybersecurity and networking services that make your company safer and more secure. That’s all we do, so you can concentrate on all the things that you do best.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

Synersoft BLACKbox

Synersoft BLACKbox

Synersoft, the maker of path-breaking and disruptive technology for SMEs, now branded as BLACKbox, is an incubated and invested portfolio company of CIIE - IIM-Ahmedabad.

QualySec

QualySec

QualySec is a leading cybersecurity firm specializing in comprehensive penetration testing and risk assessment services.