News

2018-04-26

Artificial Intelligence Is Too Narrow

AI is based on sophisticated algorithms and the brute force of huge computing power. This makes it powerful, but its very specificity is a problem.

2018-05-08

Killer Robots Are A Revolution in Warfare

Fully autonomous weapons do not yet exist, but senior military thinkers say the use of robots will be widespread in warfare in a matter of years.

2018-04-25

Listening To Your Inner Voice

MIT researchers invent a wearable device that can read people’s internal voice, allowing them to control devices and ask queries without speaking.

2018-04-27

How AI & Machine Learning Can Revolutionise eCommerce

Its Not Just Amazon: As the right data and expertise fall into place, AI and machine learning will be game changers for eCommerce brands.

2018-04-25

The Apps That Map Violence

Residents of Rio de Janeiro are flocking to use crowdsourcing apps and following the social network pages of crime-watch groups for safety.

2018-04-23

A New Distributed Database Adds GDPR Controls

The company with a terrible name introduces a useful new cloud data product to facilitate automated multi-territory compliance with GDPR.

2018-04-23

The Cambridge Analytica Scandal 'highlights need for AI regulation'

British legislators are worried about the potential for misuse & monopolisation of data by big technology companies operating in the UK.

2018-04-20

Google Chairman Unaware Of Pentagon AI Project

Google is bidding for a multi-billion dollar Pentagon cloud contract. Which comes as news to the company Chairman, Eric Schmidt.

2018-04-19

Offensive Cyberattacks Must Balance Lawful Deterrence & The Risks Of Escalation

A government contemplating the use of offensive cyber operations will need to consider the precedents – or the lack of them.

2018-04-16

Vigilante Hackers Attack Nation States

Self-styled 'vigilante' hackers have carried out attacks on Russian and Iranian election infrastructure. Who would do that?

2018-04-16

UK Launches Cyber Attack On Islamic State

GCHQ says the UK has conducted a "major offensive cyber-campaign" against the Islamic State group.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

iXsystems

iXsystems

iXsystems is a leader in Open-Source enterprise server and storage solutions including Backup & Recovery to protect critical data.

Avatu

Avatu

Avatu specialise in providing clients the advice, technology and tools they need to fight cyber and insider threats.

Gurucul

Gurucul

Gurucul predictive security analytics protects against insider threats, account compromise and data exfiltration on-premises and in the cloud.

Cyan Securiy Group

Cyan Securiy Group

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

ProSearch Partners

ProSearch Partners

ProSearch Partners are national talent acquisition specialists exclusively focussing on Technology and Digital talent including Cybersecurity, Data Analytics and Execs.

Maven Security Consulting

Maven Security Consulting

Maven Security Consulting helps companies secure their information assets and digital infrastructure by providing a wide range of customized consulting and training services.

AgileBlue (Agile1)

AgileBlue (Agile1)

AgileBlue (formerly Agile1) is a managed breach detection company with an Autonomous SOC-as-a-Service for 24×7 monitoring, detection and guided response.

South East Cyber Resilience Centre (SECRC)

South East Cyber Resilience Centre (SECRC)

The South East Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

ramsac

ramsac

ramsac provide secure, resilient IT management, cybersecurity, 24 hour support and IT strategy to businesses in London and the South East.

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

Auriga

Auriga

Auriga create innovative software and have become a benchmark for high quality banking software including cyber security solutions to protect business critical devices.

Prescott

Prescott

Prescott acts as your guiding light in the preparation for your CMMC assessment and long after by governing your cybersecurity practice.

StepSecurity

StepSecurity

StepSecurity provides a comprehensive security platform for GitHub Actions.

Invisinet Technologies

Invisinet Technologies

Invisinet is a cybersecurity technology company specializing in innovative solutions that protect network infrastructure and critical assets from advanced threats.

OryxAlign

OryxAlign

OryxAlign offer managed IT and cyber security, cloud and digital transformation, and tailored professional and consulting services.