News

2018-08-10

Powering The Future Of Artificial Intelligence

AI’s rapid evolution is producing a very big expansion in various new types of hardware accelerators for machine learning.

2018-07-26

Healthcare Cyber-Attacks Still Going Up

Healthcare providers and government agencies across the US are scrambling to find adequate defense mechanisms against attackers.

2018-08-09

Public Cloud Security Is A Conundrum

According to the experts at Gartner, the cloud is just like traditional forms of computing, except that everything is different.

2018-08-07

Social Media Giants Under Caution In Vietnam

US lawmakers urge Google and others not to comply with a Vietnamese security law that requires local storage of domestic users’ data.

2018-08-06

Understanding Cyber Vulnerability, Threats & Risks

Less than half of security leaders are confident in their organisation’s ability to combat anything beyond simple cyber incidents.

2018-08-06

GDPR Survey Shows 80% Non-Compliance

Only 20% of companies surveyed believe they are GDPR compliant, while 53% are in the implementation phase and 27% have not started.

2018-08-02

Five Key Ways to Protect Your Company Against Cyber Attacks

The steps to achieving business security include the use of up-to-date data encryption, data back-up, firewalls, anti-malware software and insurance.

2018-07-25

Singapore’s Giant Healthcare Hack

Hackers attacked the computers of SingHealth, the Republic's largest public healthcare group and scooped up personal information on 1.5m patients.

2018-08-02

MoneyTaker Take Money From A Russian Bank

The MoneyTaker group are hard to track because they use common OS utilities to perform malicious actions, instead of relying on actual malware.

2018-07-25

Trump / Putin Summit Was A Magnet For Hackers

The Helsinki meeting between Presidents Trump and Putin was as big a magnet for hackers as the Singapore summit with Kim Jong-un.

2018-08-02

What A ‘Cyber 9/11’ Would Look Like

Experts think national cyber vulnerabilities stem in large part from a lack of qualified people capable of defending companies and governments.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Site24x7

Site24x7

Site24x7 is an AI-powered observability platform for DevOps and IT operations.

Cryptus Cyber Security

Cryptus Cyber Security

Cryptus Cyber Security is an Information Security Training company providing advanced training and services to IT Professionals.

Mega

Mega

Mega is a secure cloud data storage provider with browser-based high-performance end-to-end encryption.

Secusmart

Secusmart

Secusmart provide highly secure and encrypted speech and data communication solutions.

PSC

PSC

PSC is a leading PCI and PA DSS assessor and Approved Scanning Vendor.

Security Brokers

Security Brokers

Security Brokers focus services and solutions with a focus on strategic ICT Security and Cyber Defense issues.

Privacy Analytics

Privacy Analytics

Privacy Analytics enables healthcare organizations to unleash the value of sensitive data for secondary purposes without compromising personal health information.

SafeBreach

SafeBreach

SafeBreach's platform simulates hacker breach methods across the entire kill chain to identify breach scenarios in your environment before an attacker does.

Independent Security Evaluators (ISE)

Independent Security Evaluators (ISE)

ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research.

Anglo African

Anglo African

Anglo African is an information technology firm providing end-to-end solutions to different industries, from IT Infrastructure to DataCom as well as Cloud & InfoSec services.

AppTec

AppTec

AppTec is a leading software vendor in the field of Unified Endpoint Management and Mobile Security.

MagicCube

MagicCube

MagicCube is a device independent IoT security platform that protects against on-device, cloud, and network attacks.

Primus Institute of Technology

Primus Institute of Technology

At Primus Institute of Technology our mission is to inspire, support, and empower current and aspiring IT professionals through training and career development workshops.

McKinsey & Company

McKinsey & Company

McKinsey & Company is a global management consulting firm. We are trusted advisor to the world's leading businesses, governments, and institutions.

Evervault

Evervault

Evervault provides engineers easy solutions to complex data security and compliance problems.

Equixly

Equixly

Equixly is revolutionizing application security by empowering developers and organizations to build more secure software, elevate their security posture, and stay ahead of emerging threats.