News

2018-08-31

Surveillance Cameras That Spot Your Personality Type

AI can be used to analyse biometric data, like subtle on-camera eye movement, to predict personality traits better than random guessing.

2018-08-31

What Are Deepfakes?

The Internet now mediates every aspect of our lives, and an inability to trust anything we see could lead to an "end of truth."

2018-08-23

Phone Calls, Texts Or Email - How Do Millennials Communicate?

The fundamentals of good communication don’t change between generations, but personal voice communications are slipping down the priority list.

2018-08-16

Balancing Security With Digital Transformation

How do companies keep up with the pace of technical innovation & competition while protecting their critical assets from security breaches?

2018-08-30

AI Driven Security Is Much More Than An Algorithm

Good data boosts AI's ability to make judgments, and this starts with baseline data about users, devices, network systems and workflow patterns.

2018-08-30

GDPR Means Revisiting Email Marketing

Business can no longer approach email marketing strategies casually. Under GDPR, you are required to be able to prove every user chose to sign up.

2018-08-30

Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats

Hiding illicit nuclear programs might be getting harder, thanks to new ways of gleaning and combining clues from different rivers of digital data.

2018-08-07

Criminals Are Driving Australian Data Breaches

Criminal attacks accounted for the majority of data breaches reported to the Office of the Australian Information Commissioner in Q2 2018.

2018-08-29

Estonia’s Cyber Revenge

Estonia, the small EU nation that was the first target of state-sponsored cyber warfare from Russia, may soon be able to strike back.

2018-08-29

Bank Industry Is Turning On To AI Technology

The rapid growth of AI is due to increasing market competition, the need to reduce overheads plus the benefits of capturing large volumes of data.

2018-08-29

What Is Stuxnet And Who Created It?

Thanks to Stuxnet, we now live in a world where covertly inserted malicious code can destroy machinery and stop (or start) a war.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

Suprema

Suprema

Suprema is a leading global provider of access control and biometrics solutions.

Templar Executives

Templar Executives

Templar Executives is a leading, expert and dynamic Cyber Security company trusted by Governments and multi-national organisations to deliver business transformation.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

ProSearch Partners

ProSearch Partners

ProSearch Partners are national talent acquisition specialists exclusively focussing on Technology and Digital talent including Cybersecurity, Data Analytics and Execs.

ProofID

ProofID

ProofID is a specialist provider of Identity Access Management (IAM) solutions. We focus on the solving the complex needs of the modern enterprise.

Gula Tech Adventures

Gula Tech Adventures

Gula Tech Adventures invests in companies and nonprofits that help close the gap in needed technology and workforce to defend the country in cyberspace.

Exterro

Exterro

Exterro is a leading provider of e-discovery and information governance software specifically designed for in-house legal, privacy and IT teams at Global 2000 and Am Law 200 organizations.

Stripe OLT

Stripe OLT

At Stripe OLT, we provide complete business technology solutions - Our team has an unrivalled reputation as a Microsoft Gold Partner, specialising in secure, cloud-first technology.

FoxTech

FoxTech

FoxTech is an independent, friendly and deeply specialised cyber security company in the UK, with expertise spanning decades of Public Sector and Government services.

FPG Technologies & Solutions

FPG Technologies & Solutions

FPG Technology is a technology solutions provider and systems integrator, specializing in delivering IT Consulting, IT Security, Cloud, Mobility, Infrastructure solutions and services.

Lumifi

Lumifi

Lumifi provide end-to-end cybersecurity resilience solutions with a specialty in managed detection and response (MDR) services.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Borwell

Borwell

Borwell delivers software and IT solutions to the UK MoD and to UK Government departments, which are secure by design.

Treacle Technologies

Treacle Technologies

Treacle Technologies are a Cyber Security startup with a focus on Defensive Security.

Conifers.ai

Conifers.ai

Empower your existing SecOps team with the strength of AI - achieve SOC excellence with Conifers CognitiveSOC.