Julian Assange - One Hour Live stream in Central London

www.cybereurope.events

Julian Assange is the face of WikiLeaks, the headline-making publishing organisation famous around the world for releasing secret information from corrupt governments, unaccountable corporations, occupying militaries and secretive international trade deals. Founder, philosopher, editor-in-chief and original financier, his name and the WikiLeaks brand are inseparable, and both have proven indomitable over the organisation’s 10 year publishing history.

 

Achieving Effective Application Security in a Cloud Generation

Wednesday, 16 May, 2018

Today’s modern applications are designed for scale and performance. To achieve this performance, many of these deployments are hosted on…

Cyber security – is it a science?

Tuesday, 25 April, 2017

  Chris Few, foreseeti UK business manager, discusses the ability of the cyber security profession to make testable predictions of…

View
View All

The risks of not being GDPR compliant

Monday, 7 August, 2017

  There has been loads written and talked about surrounding General Data Protection Regulation (GDPR). The new regulation is arguably…

View
View All

Complying With GDPR: What all Organisations Need to Know

Tuesday, 13 June, 2017

  Data protection laws are more important than ever before as individuals are becoming more and more sensitive about privacy, data…

View
View All
Latest News

Is there a patch for my users?

Monday, 21 May, 2018

Attackers love exploiting the naivety of users because it’s so easy. All it takes is one successful phishing email to…

Highly Sensitive Encrypted Email at Risk of Exposure | Cybersecurity

Wednesday, 16 May, 2018

By John P. Mello Jr. May 15, 2018 9:36 AM PT A newfound flaw in email clients that use PGP…

Attackers Use UPnP to Sidestep DDoS Defenses | Threatpost

Wednesday, 16 May, 2018

Universal Plug and Play networking protocols have never been a friend of security researchers. On Monday, Imperva gave the InfoSec…

Protego Labs Raises $2 Million in Seed Funding

Thursday, 10 May, 2018

Serverless application security firm Protego Labs announced Wednesday that it has raised $2 million seed funding from a group of…

GDPR Strategies

We are excited to launch our new dedicated section for The General Data Protection Regulation, providing key insights to ensure your organisation complies. With contribution from key bodies such as the European Commission and the European Parliament. Read More


The Future of Cyber Security on Sky News


 

Watch out hacked companies, Firefox is going to tell the world about your data leaks

Thursday, 23 November, 2017

Firefox, the internet browser developed and maintained by Mozilla, will soon have the ability to warn internet users if the…

Most Read Articles

Can Machine Learning Outsmart Malware?

Wednesday, 11 October, 2017

Using machine learning in the cybersecurity domain is a growing trend with many advantages, but it also has its risks….

Watch out for these high-pressure Apple malware scams – Naked Security

Wednesday, 11 October, 2017

We noticed a lull in recent months in emails and web pages that SHOUT THAT YOUR MAC IS INFECTED and…

image

Hacked Drupal Sites Deliver Miners, RATs, Scams

Monday, 21 May, 2018 In General News, Hacker Zone

The Drupal websites hacked by cybercriminals using the vulnerabilities known as Drupalgeddon2 and Drupalgeddon3 deliver cryptocurrency miners, remote administration tools…

Is there a patch for my users?

Monday, 21 May, 2018 In General News, Hacker Zone, Other News

Attackers love exploiting the naivety of users because it’s so easy. All it takes is one successful phishing email to…

What Israel’s Elite Defense Force Unit 8200 Can …

Monday, 21 May, 2018 In Featured News, General News

Unit 8200 doesn’t follow a conventional recruiting model. Technical knowledge isn’t a requirement. The unit values traits that emphasize problem-solving…

Highly Sensitive Encrypted Email at Risk of Exposure | Cybersecurity

Wednesday, 16 May, 2018 In General News, Other News

By John P. Mello Jr. May 15, 2018 9:36 AM PT A newfound flaw in email clients that use PGP…

Attackers Use UPnP to Sidestep DDoS Defenses | Threatpost

Wednesday, 16 May, 2018 In General News, Other News

Universal Plug and Play networking protocols have never been a friend of security researchers. On Monday, Imperva gave the InfoSec…

image
Latest Videos
Polls
Sorry no Polls available - check back soon