News

2016-07-04

Is Moscow Trying To Influence The US Presidential Election?

It would seem that Vladimir Putin favours Donald Trump to be US President and is trying to do something about it.

2016-07-01

Frankenstein’s Paperclips

Rules governing the behaviour of AI systems have had currency since Isaac Asimov invented the “Three Laws of Robotics”. Now we need them.

2016-07-01

Government In The Information Age

Alvin Toffller's predictions for the evolution of the Industrial Era into the Information Age are coming true; the role of government must evolve too.

2016-07-01

Edward Snowden’s Lawyer Wants Obama To Give Him A Pardon

An Element Of Absurdity: Edward Snowden's lawyers have vowed to step up pressure on Barack Obama for a Presidential Pardon.

2016-06-30

What Might ‘Brexit’ Mean For Cybersecurity In The UK?

While some cybersecurity pros say that Brexit will have little ill-effect on the industry, others aren't so sure.

2016-06-30

Lessons Learned From Major Healthcare Breaches

Huge amounts of personal health data being collected, shared & analyzed. There are more reasons to worry about patient privacy than ever.

2016-07-04

Enhanced Attribution: An Engine To Identify Hackers

DARPA's “Enhanced Attribution Program” will enable US government agencies to characterize an attacker and predict where they will strike next.

2016-07-04

Technology Advances Too Fast For Government

The former head of the US Defense Advanced Research Projects Agency warns that technology is advancing too fast for governments to keep up.

2016-06-28

Responding To Russia´s Cyber Aggression

Russia or China? NATO needs to step up and agree who’s the biggest cyber threat

2016-06-29

Top 10 Technologies For Information Security

Research firm Gartner have picked the top 10 technologies for information security and their implications for security organizations in 2016.

2016-07-04

How Will IOT Change Banking?

The banking industry is now starting to see the various potential ways in which IoT can help to take it to the next level.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Council on Foreign Relations (CFR)

Council on Foreign Relations (CFR)

CFR is dedicated to better understanding the world and the foreign policy choices facing the USA and other countries. Cyber security is covered within the CFR topic areas.

ActiveCyber

ActiveCyber

ActiveCyber is a source for news, reviews, learning, and technological innovation in the active cyber defense industry.

Cybercrowd

Cybercrowd

Cybercrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Real Random

Real Random

Real Random is on a mission to enhance existing and new crypto-systems with its revolutionary solution to generating numbers that are Truly Random.

NLnet Labs

NLnet Labs

NLnet Labs is a not-for-profit foundation with a long heritage in research and development, Internet architecture and governance, as well as security in the area of DNS and inter-domain routing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Combis

Combis

COMBIS is a regional high-tech ICT company focused on the development of application, communication, security and system solutions and the provision of services.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

National Cybersecurity Student Association (NCSA) - USA

National Cybersecurity Student Association (NCSA) - USA

The National Cybersecurity Student Association is a one-stop-shop to enhance the educational and professional development of cybersecurity students through activities, networking and collaboration.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

SAST

SAST

SAST provide Static Application Security Testing as a service based on SAST Tools.

SAIFE

SAIFE

SAIFE has adapted a Software Defined Perimeter approach and paired it with a Zero Trust model that defines access by the user, their device, and where they are located.

Opticks Security

Opticks Security

Opticks provides fraud detection and monitoring solutions for leading brands. agencies and networks. Our relentless mission is to deliver reliable and innovative software to beat digital fraud.

SecurelyShare Software

SecurelyShare Software

SecurelyShare Software is a security software company, specializing in data security, data privacy and data governance.

Myntex

Myntex

Myntex® builds the future of mobile security. We empower our partners to deliver exclusive mobile endpoint security software, fortifying against mobile threats, device exploits and data exfiltration.