News

2018-01-30

Looming Cyber Threats From Russia & N. Korea

Threats from Russia & N.Korea have increased and cybercriminals have improved their tactics, techniques & procedures, according to Flashpoint.

2018-01-29

Google’s AutoML Offers Machine Learning Models Without Having To Code

AutoML Vision helps developers, including those with no machine learning expertise, build custom image recognition models.

2018-01-29

Making Data Scientists More Productive

Business is adopting a self-service model for their data scientists and using 'data curators' to make these highly skilled specialists more productive.

2018-01-29

India’s Political Parties Fighting A Cyberwar

Indian regional elections are highly contested and this year the arguments in Karnataka State are spurring big growth in social media traffic.

2018-01-29

Get Serious About Hardware Cybersecurity

Meltdown and Spectre highlight the need to defend against vulnerabilities in embedded hardware for critical infrastructure.

2018-01-26

Russia Will Create Its Own Internet

Russia is declaring independence from ICANN and will set up its own network of root servers for its domestic market and those of other BRIC nations.

2018-01-26

Cyber Insurance: Good News & Bad News

Cybersecurity insurance is critical. Without this essential service, you could suffer a cyberattack that kills your business for good.

2018-01-26

Employees Are Key To Cybersecurity

Insiders are the largest source of corporate data breaches, inadvertent or malicious, yet 55% do not get any training.

2018-01-25

Pentagon Considers Nuclear Retaliation To Big Cyber Attacks

An extreme response to an extreme problem: Why use hack-back tactics when you can drop a nuke on your cyber attackers?

2018-01-25

World Economic Leaders Fear Increasing Cyber Attacks

World leaders at WEF in Davos are contemplating a “deteriorating geopolitical landscape” where cybersecurity has jumped right up the agenda.

2018-01-24

Companies Are Buying Cyber Insurance 'in mad panic'

Many firms feel under siege from cyber attackers. But can insurers quantify the risk accurately and could insurance lead to corporate complacency?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Hacker House

Hacker House

Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied through active measures.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

EnigmaSoft

EnigmaSoft

EnigmaSoft is known for its PC anti-malware remediation utility and service under the tradename SpyHunter.

KirkpatrickPrice

KirkpatrickPrice

KirkpatrickPrice is dedicated to providing you with innovative security guidance and efficient audit services.

Getronics

Getronics

Getronics guides customers through their own transformation journeys, leveraging an integrated and secure-by-design IT portfolio.

Solvo

Solvo

Solvo enables security teams and other stakeholders to automatically uncover, prioritize, mitigate and remediate cloud infrastructure access risks.

The Purple Guys

The Purple Guys

The Purple Guys offer Trouble-Free IT Support to businesses across the Central and Southern US. Safe and Secure, Rapid Response, Friendly Support that’s our Purple Promise.

Mercury Systems

Mercury Systems

Mercury Systems is the leader in making trusted, secure mission-critical technologies profoundly more accessible to aerospace and defense.

ZAG Technical Services

ZAG Technical Services

ZAG Technical Services is an award-winning information technology consulting firm delivering digital transformation solutions, IT assessments, managed services, security, and support.

BBS Technology

BBS Technology

BBS Technology is a company that develops and delivers next-generation cyber security technologies worldwide.

Ipseity Security

Ipseity Security

Ipseity Security provide security-centric advisory and consulting services for organizations to secure their perimeter-less digital transformation to meet business and security requirements.

Harmonia Holdings Group

Harmonia Holdings Group

Harmonia Holdings Group was born in 2006 with the vision to bring innovation and change to the federal IT sector.

VCI Global

VCI Global

VCI Global is a diversified holding company. Through its subsidiaries, it focuses on consulting, fintech, AI, robotics, and cybersecurity.