News

2018-02-16

Chinese Healthcare Technology Moves Ahead

The big tech firms like Alibaba and Tencent have made delivering better healthcare a priority and are more ambitious than their international peers.

2018-02-14

Blockchain To Secure Storage Of Sensitive Data

Blockchain technology can improve on current, centralised data security solutions and help keep vital information safe and under control.

2018-02-12

Employees Are Still The Cause Of Most Cyber Breaches

As cybercrime grows at an astronomic rate, is your biggest strength, the human capital in your business, jeopardising your company's security?

2018-02-20

Flight Ticket Fraud Alert

Fraudsters are attempting to entice UK victims who are looking for cheap flights abroad to Africa and the M East with fake online tickets.

2018-02-15

AI Cyber Attacks Will Be Almost Impossible For Humans to Stop

Coming Soon: Truly autonomous weaponised artificial intelligence that delivers its blows slowly, stealthily and virtually without trace.

2018-02-16

Inspired: China Measures Citizens' Trustworthiness

China is exploring how AI & Big Data can be used to monitor social media interactions and has plans to assign citizens a 'social-reliability' rating.

2018-02-14

Girls Are Future Cybercrime Fighters

There are many career opportunities for girls in cybersecurity, but only 11 percent of the world's information security workforce are women.

2018-02-15

What is the Industrial IoT?

The IIOT connects machines and devices in industries across transportation, power and healthcare. The potential is high and so are the risks.

2018-02-14

Businesses Using Apple & Cisco Products Pay Less For Insurance

Superior Security: Insurance giant Allianz will give businesses using Apple & Cisco products better terms on their cyber insurance coverage.

2018-02-15

Self-Drive Trucks Now Working In Australia

Self-driving trucks have begun to hit the roads in the United States, but they’re already hard at work in Australia.

2018-02-15

Islamic State Likely To Switch To Cyber Warfare

Along with other terrorist groups IS are turning to the cybercrime underworld to secure tools to carry out attacks on critical infrastructure.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ITQ

ITQ

ITQ is an IT consulting firm with a focus on the entire VMware-product portfolio with three main services: Professional Services, Support Services and Managed Services.

Techmeme

Techmeme

Techmeme is an online news curation service focused on leading edge technology, including cyber security.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

Ikerlan

Ikerlan

Ikerlan is an R&D technology centre specialising in areas including embedded systems, industrial automation and industrial cybersecurity.

7Safe

7Safe

7Safe has been delivering hands-on digital security training courses since 2001 and offer e a portfolio of university and industry-accredited courses.

Nok Nok Labs

Nok Nok Labs

Nok Nok is a market leader in next generation authentication for cloud, mobile and IoT applications.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

Nemko

Nemko

Nemko offers testing, inspection, and certification services worldwide, mainly concerning products and systems, but also for machinery, installations, and personnel.

The ATOM Group

The ATOM Group

ATOM builds and secures technology for regulated industries. We design and build for a future we can all trust.

Valency Networks

Valency Networks

Valency Networks provide cutting edge results in the areas of Vulnerability Assessment and Penetration Testing services for webapps, cloud apps, mobile apps and IT networks.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

Department of Homeland Security (DHS)

Department of Homeland Security (DHS)

The Department of Homeland Security has a vital mission: to secure the nation from the many threats we face. Our duties are wide-ranging, but our goal is clear - keeping America safe.

Radiance Technologies

Radiance Technologies

Radiance solutions provide technological advantage and operational superiority for our nation in the areas of intelligence, cyber and advanced weapon systems.

Theos Cyber Solutions

Theos Cyber Solutions

Theos Cyber provides service-first cybersecurity solutions to digital businesses in Asia.

Cytek

Cytek

Cytek is a leading provider of cybersecurity and HIPAA compliance for dental practices and other industries.

REAL Security

REAL Security

REAL Security is a market leader across the Adriatic region in value-added distribution in the field of IT Security & virtualisation.