News

2016-02-29

PWC On The Hunt For 1,000 Data Scientists

PwC recognise the increasing demand for advanced data-driven insights when making an acquisition or divestment business decisions.

2016-02-29

Android Banking Trojan Xbot Is Also Ransomware

New Android malware steals online banking credentials and can hold a device's files hostage delivering a particularly nasty one-two punch.

2016-03-02

IT Spending Predicted To Slow

Worldwide IT spending is expected to post a major slowdown in 2016, in a significantly slower pace of tech spending growth.

2016-03-02

Big Data & Predictive Analytics Can Identify Cyber Risks

Using predictive indicators to detect the unknown risk is incredibly challenging but, properly used, big data can solve big business problems.

2016-03-02

Great Wall: China Bans Foreign Online Publishing

Firewall: China is to ban foreign firms from "online publishing" as the country increasingly seeks to minimise Western influence.

2016-03-02

Giant Financial Hacking Prosecution Expands

Five Russian citizens plus four companies being pursued over a computer hacking scam that generated $100 million of illicit profits from insider trading.

2016-03-02

Three Pronged Attack: Chinese Military In Cyberwarfare Buildup

The Chinese military cyber force includes one cadre of dedicated military specialists devoted to network warfare, cyberattacks and defense.

2016-03-02

Ex CIA Director: Keep America Safe, Embrace Drone Warfare

Targeted killing using drones has become part of the American way of war. Doing it legally is the tricky bit, says Michael Hayden.

2016-03-04

Cybersecurity Is Childsplay

Estonia sees long-term benefits to teaching computer security in schools.

2016-03-02

Facebook Uses AI To Map People's Homes

Facebook has used its AI tools to identify human-made structures in 20 different countries to find where to deploy internet-beaming drones.

2016-03-01

Predictive Analytics For Web Content

Using analytics to measure how your content is received by your intended audience should be a priority, but the data must be actionable to be useful.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

BPC Banking Technologies

BPC Banking Technologies

BPC’s advanced fraud prevention solution helps card issuers and acquirers combat the growing threat by monitoring 100% of transactions, online, in real-time across all channels.

Cyber Security & Information Systems Information Analysis Center (CSIAC)

Cyber Security & Information Systems Information Analysis Center (CSIAC)

CSIAC is chartered to leverage best practices and expertise from government, industry, and academia on cyber security and information technology.

The Media Trust

The Media Trust

The Media Trust continuously scans websites, ad tags and mobile apps and alerts on anomalies affecting websites and visitors.

Claranet

Claranet

Claranet are experts in modernising and running critical applications and infrastructure through end-to-end professional services, managed services and training.

Amadeus Capital Partners

Amadeus Capital Partners

Amadeus Capital Partners offers over 20 years’ experience in technology investment. Our areas of focus include AI & machine learning and cyber security.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

Aryaka

Aryaka

Aryaka’s SmartServices offer connectivity, application acceleration, security, cloud networking and insights leveraging global orchestration and provisioning.

CyberScotland

CyberScotland

The CyberScotland Partnership is a collaboration of key strategic stakeholders, brought together to focus efforts on improving cyber resilience across Scotland in a coordinated and coherent way.

Airgap Networks

Airgap Networks

Airgap is fixing the fundamental flaw of excessive trust. We help enterprises modernize their network for a simple and secure infrastructure.

The IoT Academy

The IoT Academy

The IoT Academy is a reputed Ed-Tech Institute that provides training in emerging technologies such as embedded systems, the Internet of Things (IoT), Data Science and many more.

Allurity

Allurity

Allurity is a group of tech-enabled cybersecurity service providers, comprised of best-in-class experts with a common mission to enable a safe digital world.

Endure Secure

Endure Secure

Endure Secure is a managed cyber security & information security consultancy. Our passion for IS and our understanding of the threat landscape is reflected in the services that we provide.

GoodAccess

GoodAccess

GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.

Appknox

Appknox

Appknox is the world’s most powerful plug-and-play security platform that helps developers, security researchers, and enterprises to build a safe and secure mobile ecosystem.

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

Modat

Modat

Modat is an AI-powered, research-driven company focused on developing products and services that enable cybersecurity professionals to outpace adversaries.