News

2017-11-27

Self-Drive Cars Coming to Manhattan

With some of the densest and most hectic traffic systems in in N. America, what better city to use for testing autonomous cars than New York City?

2017-11-13

All WiFi Networks Are Vulnerable to Hacking

The security protocol protecting the vast majority of WiFi connections has been broken, exposing wireless Internet traffic to eavesdroppers.

2017-11-17

Artificial Intelligence Needs Regulation

As AI becomes widely available it is driving forward a wide range of industrial applications, but there are some big concerns over cybersecurity.

2017-11-10

Cyber Risk Insurance: A View From The Prudential Regulation Authority

The Bank of England's financial services regulatory arm thinks that insurers underrate their exposure to cyber risks.

2017-11-07

AI Applied To Video Analytics

An AI technology that is the world’s first to show an awareness of its environment and of the actions occurring within it has been developed.

2017-11-24

Oxford University’s Cyber Research

Oxford University's Centre for Technology and Global Affairs researches the impact of technology on international relations, government & society.

2017-11-27

Artificial Intelligence, Robotics & All Tomorrows Wars

An Experts Group on robotics and AI have sent a warning letter to the UN Convention on Certain Conventional Weapons. Is anyone listening?

2017-11-23

Robots Could Join The Ukrainian Conflict

Phantom: A Ukrainian military robot with multiple deadly weapons could soon be deployed agints Russian ground forces in Donetsk.

2017-11-20

AI: Experts Talk Ethical & Security Concerns

The future of artificial intelligence was a hot topic at the CYBERSEC Cybersecurity Forum, where security professionals discussed potential of AI.

2017-11-16

Unstructured Data: Threats You Cannot See

Structured data is only a small portion of a larger, more complicated puzzle. Security teams struggle to identify, collect & analyse unstructured data.

2017-12-04

Poor North Korea Is A Cyber Superpower

North Korea may be poor, but has proved its destructive powers and is successfully engaged in a full scale cyberwar with South Korea and the US.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

SecureNow Insurance Broker

SecureNow Insurance Broker

SecureNow is a commercial insurance broker based in India. Services offered include Cyber Risk insurance.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

CyberSecurity Malaysia

CyberSecurity Malaysia

CyberSecurity Malaysia is the national cyber security specialist agency under the Ministry of Science, Technology and Innovation (MOSTI).

Secure Blockchain Technologies (SBT)

Secure Blockchain Technologies (SBT)

SBT is a team of Enterprise IT Security Professionals weaving security and Blockchain Technology into our customer’s operational fabric.

African Cyber Security

African Cyber Security

African Cyber Security and it's partners, have the expertise and skills to provide holistic solutions for companies, institutions and government.

BluBracket

BluBracket

BluBracket is the first comprehensive security solution that makes code safe—so developers can innovate and collaborate, and security teams can sleep at night.

Cyber Security Operations Consulting (CyberSecOp)

Cyber Security Operations Consulting (CyberSecOp)

CyberSecOp is an ISO 27001 Certified Organization which provides cyber security operations services and risk management consulting.

HB-Technologies

HB-Technologies

HB-Technologies is pioneer in Africa, in digital security, embedded electronic and IT solutions based on highly secure smart cards that comply with international standards and norms.

US Coast Guard Cyber Command

US Coast Guard Cyber Command

US Coast Guard Cyber Command’s focus is to ensure the security of our cyberspace, maintain superiority over our adversaries,and safeguard our Nation’s critical maritime infrastructure.

Guardio

Guardio

Guardio develop tools and products to combat modern web and browser threats.

WhiteJar

WhiteJar

WhiteJar offers an innovative approach to modern cybersecurity needs, empowering Ethical Hackers within its unique crowd platform.

AmiViz

AmiViz

AmiViz is the first B2B enterprise marketplace focussed on Cybersecurity business in the Middle East and Africa, designed specially to serve the interests of enterprise resellers and vendors.

AUCyber

AUCyber

AUCyber is a leading provider of managed cyber security solutions and consultancy services, specialising in supporting Australian organisations and Government agencies.

IntelliBridge

IntelliBridge

IntelliBridge supports our nation’s most critical missions by solving complex technology, intelligence, and mission support challenges.

Aikido Security

Aikido Security

Aikido is the no-nonsense security platform for developers. Secure your code, cloud, and runtime in one central system. Find and fix vulnerabilities automatically.

Scalefusion

Scalefusion

Scalefusion provides a comprehensive suite of products engineered to simplify endpoint, user, and access management for IT teams.