News

2017-01-16

German Police Will Squash Fake Online News

Pure Fiction: Combining exaggerated and unconnected incidents to create a picture of chaos and of foreigners promoting terrorism.

2017-01-16

Five Cybersecurity Predictions for 2017

The enterprise security Ninjas at Tanium list their top five predictions for cybersecurity in the year ahead.

2017-01-16

Police Connectivity: In-Car Video & Body Cameras

The ability of police systems to communicate with each other can result in better operational performance.

2017-01-13

AI and VR Are About To Transform Business

Artificial Intelligence & Virtual Reality are synonymous with gaming but they are going to change the way you communicate and do business.

2017-01-13

ISIS Just Can’t Resist Social Media

Social media is a key tool used by Jihadis to recruit followers, spread their radical interpretations of Islam and to promote outrage.

2017-01-13

Vladimir Putin & Donald Trump: Relationship Counselling

President-elect Trump is not yet in office and the allegations that President Putin interfered with the election in his favour are not going away.

2017-01-11

How AI Will Solve The Skills Shortage

Just as the Internet has revolutionised IT in the last 25 years, the current trajectory places AI squarely at the next technology inflection point.

2017-01-11

Russia Waging Cyberwar On Ukraine

Silent War: The Ukrainian President says Russian security services are waging a cyberwar against his country.

2017-01-11

Seamless Bio Electronic Devices

Bio Electronics: Harnessing biological rules to exchange information between the biochemistry of our bodies and the chemistry of our devices.

2017-01-11

The Digital Transformation Of The Humanitarian Sector

No industry is immune to being disrupted by technology. And that includes conflict and humanitarian relief. Opinion by Anje Kaspersen

2017-01-10

Surprise: Snowden Knows Some Russian Spies

Edward Snowden “has had and continues to have contact” with Russian intelligence services since arriving to safety in Moscow three years ago.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Security Magazine

Security Magazine

Security, the business magazine for security executives, focuses on management issues facing top security professionals and effective solutions being employed, both physical and cyber.

Arete

Arete

Arete is a global cyber risk company whose mission is to transform the way organizations prepare for, respond to, and prevent cybercrime.

H-ON Consulting

H-ON Consulting

H-ON Consulting develops and applies robust cyber security procedures enabling control systems to be secure.

th4ts3cur1ty.company

th4ts3cur1ty.company

th4ts3cur1ty.company specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers.

Cutting Edge Technologies (CE Tech)

Cutting Edge Technologies (CE Tech)

CE Tech is a Next Generation Technology Partner providing advanced technology infrastructure solutions through partnerships with leading technology providers.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

Protected Media

Protected Media

Protected Media’s advanced cybersecurity ad fraud solution guards you against current and emerging threats across Connected TV, Display and Video advertising.

Aegis Security

Aegis Security

Aegis Security helps clients to secure their systems against potential threats through pre-emptive measures, such as security assessments, and cutting-edge solutions to security challenges.

Truvantis

Truvantis

Truvantis is a cybersecurity consulting organization providing best-in-class cybersecurity services to secure your organization’s infrastructure, data, operations and products.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

PCCW Global

PCCW Global

PCCW Global is a leading communications service provider, offering mobility, voice and data solutions to multinational enterprises, telecomms partners, cloud and application service providers.

RADICL

RADICL

RADICL's mission is to give SMBs that serve America's Defense Industrial Base (DIB) access to strong, enterprise-grade cyber security protection.

Tranchulus

Tranchulus

Tranchulus are a global provider of offensive and defensive cyber solutions, information security assessment, compliance and managed security services.

DYOPATH

DYOPATH

At DYOPATH we work with the single purpose of helping our clients combat the ongoing increase of cyber threats, the growth in more complex IT environments, and ever-increasing human capital shortages.

Securitybricks

Securitybricks

Securitybricks specialize in cloud security and compliance. Our mission is to automate regulatory compliance backed by human validation.