News

2017-03-03

Self-driving Ubers are now in Arizona

Uber pinned hopes on running its self-driving fleet in San Francisco but motored off to Arizona two months ago when that plan ran up against some local red tape.

2017-03-03

Iran Cyber Attacks on Saudi Arabia

After a four-year hiatus, Iran recently resumed destructive cyber-attacks against Saudi Arabia in what US officials say is part of a long-term strategy by Tehran to take over the oil-rich kingdom and regional US ally.

2017-03-03

Google To Break Pirates Over Music Searches

UK government-hosted talks spanning two Parliaments have culminated in Google and Bing at last agreeing to tweak their search results in response to copyright-holders' concerns, thereby heading off threatened legislation on their conduct.

2017-03-25

Facebook & Google Are Killing Newspapers

National and local newspapers are dying, while Facebook along with Google controls two-thirds of the online advertising market.

2017-04-21

Malvertising Targets Your Online Users

Many of the most popular websites have at one time or another unwittingly hosted malicious ads.

2017-03-03

Cyber-Workforce Shortage to Increase

The serious talent shortage in the information security workforce shows no sign of waning:

2017-04-21

Cyber Skills Gap Grows Along With Threats

Cybersecurity Skills Gap: Fewer than one in four job applicants possess the qualifications that employers are looking for.

2017-02-27

Snowden Helping To Protect Journalists

Edward Snowden is working on tools for journalists that he hopes will help to protect them and their sources from government surveillance.

2017-02-24

DDoS Protection: 14 Unique Ways to Protect Your Organisation

DDoS attacks have become a nightmare for companies with an active online presence. Here are 14 ways to protect your business.

2017-02-22

Directors Report March 2017. Cloud Computing For Management (£)

This is a Single Report, which focuses on Cloud Computing and the range of opportunities and issues that Cloud represents for an Organisation.

2017-04-04

Deep Learning Technologies

Computer scientists have developed tiny computers to make smarter, smaller sensors for medical devices and the IoT using less energy.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

European Internet Forum (EIF)

European Internet Forum (EIF)

EIF’s mission is to help provide European political leadership for the political, economic and social challenges of the worldwide digital transformation.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

a1qa

a1qa

a1qa specializes in the delivery of full-cycle software QA and application testing services.

CloudCheckr

CloudCheckr

CloudCheckr is a next-gen cloud management platform that unifies Security & Compliance, Inventory & Utilization and Cost Management.

Ritz

Ritz

Ritz is the largest holistic pure-play cyber security solutions provider in Myanmar.

BA-CSIRT

BA-CSIRT

BA-CSIRT is a center which is dedicated to assist and raise awareness among citizens and the Government of the City of Buenos Aires in everything related to information security.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

Cyber Resilience

Cyber Resilience

Cyber Resilience offer an intensive program designed to help you create strategies to quickly become cyber resilient and to manage cyber risks in a measurable and predictable way.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

Cryptoloc

Cryptoloc

Cryptoloc's core business is developing solutions designed to protect businesses from all kinds of security threats using a unique patented cryptography.

IP2Location

IP2Location

IP2Location provide services to identify geolocation by IP address, and to detect IP addresses associated with anonymous proxy servers, which are often used for fraud and spamming purposes.

Veratad Technologies

Veratad Technologies

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions.

Query.ai

Query.ai

At Query.AI, we are committed to helping companies unlock the power of their security data, so they are empowered to meet security investigation and response goals while simultaneously reducing costs.

Atlantic Data Security

Atlantic Data Security

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure.

Testhouse Ltd

Testhouse Ltd

Testhouse is a thought leader in the Quality Assurance, software testing and DevOps space. Founded in the year 2000 in London, UK, with a mission to contribute towards a world of high-quality software

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

Kaavalan

Kaavalan

Kaavalan was founded with a mission and a vision to protect you against cyber threats in the connected world.