News

2019-07-22

E-Fusion And Industry 4.0

Industry 4.0 is driven by a technological fusion that is blurring the lines between the physical, digital & biological spheres. By Alfred Rolington

2019-07-22

AI Could Transform Submarine Warfare

Applying AI to ocean data helps submarine crews understand where their adversaries are, what they’re doing and what they can see.

2019-07-19

SMEs Run Outdated & Vulnerable Operating Systems

Security weaknesses in SMEs include antiquated Microsoft operating systems, encryption defects, poor patching and outdated email servers.

2019-07-22

Ten Reasons Why Senior Managers Need To Understand Cyber Security

Effective cyber security leadership requires the same skills and intellectual processes called for to lead organisations at the highest level.

2019-07-23

Five Hi -Tech Ways To Fight Off Cyber Attackers

A shift towards a tech-centric culture means people are at a much higher risk of cyber-attacks. Here are five innovative ways to stay secure.

2019-07-18

Air Travel Needs Stronger Cyber Security

Air transport faces unprecedented risks from cybercrime, the result of digital transformation and extensive reliance on communication technologies.

2019-07-18

Most Cyber Insurance Claims Result from Human Error

About three-quarters of cyber claims notified in 2018 to Canadian insurers involved some kind of “easily preventable” human error.

2019-07-18

Professionals Say Network Security is Getting Harder

In a survey, 64% of security professionals said network security is getting harder; a fifth of all respondents said it is getting much harder.

2019-07-17

US Cyber Strike On Iran Is A Step Change

A military action was diverted into a cyber action: Modern warfare could increasingly look like a loss of connectivity, rather than a loss of life.

2019-07-17

The Cyber Effects Of Industry 4.0 On Warfare

We are experiencing the next Industrial revolution and the effects are changing geo-politics, military tactics & warfare. By Alfred Rolington

2019-07-16

AI Solves Beatles Songwriting Dispute

Was it John Lennon or Paul McCartney? An algorithm has learned to read musical fingerprints to help resolve arguments over a song’s origins.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Frazer-Nash Consultancy

Frazer-Nash Consultancy

Frazer-Nash is a leading engineering, systems and technology company. Areas of expertise include information security and cyber security.

ESET

ESET

ESET provide security software for enterprises and consumers - Antivirus Software, Internet Security and Virus Protection.

National Cyber Security Centre (CNCS) - Portugal

National Cyber Security Centre (CNCS) - Portugal

CNCS is the operational coordinator and Portuguese national authority in cybersecurity working with State entities, and digital service providers

HackCon Norway

HackCon Norway

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

Brainloop

Brainloop

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

Cryptshare

Cryptshare

Cryptshare is a communication solution that enables you to share e-mails and files of any size securely.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

Data Theorem

Data Theorem

Data Theorem is a leading provider in modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere.

Vumetric Cybersecurity

Vumetric Cybersecurity

Vumetric is an ISO9001 certified company offering penetration testing, IT security audits and specialized cybersecurity services.

Enso Security

Enso Security

Enso is the first Application Security Posture Management (ASPM) solution, helping security teams everywhere eliminate their AppSec chaos with application discovery, classification and management.

Xalient

Xalient

Xalient is an IT consulting and managed services business, specialising in modern, software-defined networking, security and communications technologies.

RiskSmart

RiskSmart

RiskSmart empower risk, compliance, and legal teams with a tech-led and data-driven platform designed to save time, reduce costs and add real value to businesses.

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.

BuddoBot

BuddoBot

BuddoBot has been a pioneering force in cybersecurity and information technology since 2008.

Karthik Consulting (KC)

Karthik Consulting (KC)

Karthik Consulting is a technology service provider specializing in IT services for the U.S. federal government.