News

2016-08-26

Artificial Intelligence Has Finally Emerged Into Real Life

Robotics is about embedding rules into a technological process. AI is about embedding analytics into the process.

2016-08-26

Where In The World Do The Cyber Villains Live?

Hackers work all around the world, but what's particularly surprising is how much the style of an attack depends on where it comes from.

2016-08-26

Cyber Spying All At Sea

Naval vessels intercept cyber information beyond national coastal boundaries, collecting emails and other Internet data, above & below the surface.

2016-08-26

Solutions To Automotive Cyber Hacking Risks

Hacking is now one of the auto industry’s biggest concerns, especially as modern cars add more electronic controls and infotainment systems.

2016-08-25

Cyber Insurance: A Digital Necessity

All businesses, large or small operate digitally in one form or another. They need to protect themselves against their cybersecurity risk.

2016-08-25

Too Much Information: Making Sense Of Big Data

The abundance of information online and across our devices can overwhelm even the most technically savvy individuals.

2016-08-25

What’s Your Personal Data Worth On The Dark Web?

Your personal information is going to be compromised at some point. How much is your ID, password or account number worth?

2016-08-25

Risky Business: Desktop Banking Declines As Users Switch To Apps

The use of internet banking on a computer has fallen for the first time as users switch to mobile apps.

2016-08-24

Made in Britain: Facebook's Drones

In a warehouse in Somerset UK, the latest phase in Facebook's bid for world domination has been taking shape.

2016-08-24

Donald Trump Doesn’t Understand Cyberwar

Donald Trump sat down with a few reporters from The New York Times for a rare, in-depth interview about his foreign policy ideas. Oh dear.

2016-08-24

For Sale: Leaked Terror Watch List

Stolen WorldCheck database containing a detailed list of suspected and convicted criminals & terrorists is reportedly being sold online $2,300.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

CamCERT

CamCERT

CamCERT is the national Computer Emergency Response Team for Cambodia.

Cyberkov

Cyberkov

Cyberkov services include Pentesting, Vulnerability Assessments, Digital Forensics, Incident Response, Source Code Analysis and Security Training.

Nexus Group

Nexus Group

Nexus Group develops identity solutions for physical and digital access.

Independent Security Evaluators (ISE)

Independent Security Evaluators (ISE)

ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research.

TI Safe

TI Safe

TI Safe provide cybersecurity solutions for industrial networks of main critical infrastructures in Latin America.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

Whistic

Whistic

Whistic is a cloud-based platform that uses a unique approach to address the challenges of third-party risk management.

NI Cyber Security Centre

NI Cyber Security Centre

NI Cyber Security Centre works to make Northern Ireland cyber safe, secure and resilient for its citizens and businesses.

Virtual Technologies Group (VTG)

Virtual Technologies Group (VTG)

Virtual Technologies Group is a single source, IT product and services provider for SMBs and IT departments, delivering reliable, cost-efficient service, maintenance and support solutions.

Hawk AI

Hawk AI

Hawk AI’s mission is to help financial institutions detect financial crime more effectively and efficiently using AI to enhance rules and find anomalies.

Colt Technology Services

Colt Technology Services

Colt Technology Services (Colt) is a global digital infrastructure company which creates extraordinary connections to help businesses succeed.

PureID

PureID

Protect your enterprise with PureAUTH #IAMFirewall, Resilient SSO platform, purpose built to provide Passwordless Authentication & Zero Trust Access, by default.

JustunSecure

JustunSecure

JustunSecure is dedicated to promoting information technology and cybersecurity in Africa.