News

2017-09-23

US Police Real-Time Mapping Of Terrorist Attacks

A new technology for police and other first-responders supplies a real-time mapping capability to deal with active shooting attacks.

2017-09-26

IT Jobs Are Bound For Extinction

Top Tech jobs, even some of today’s hottest, like developers and data scientists,could one day find themselves on the digital scrap heap.

2017-09-26

Why Cyber Attacks Could Be War Crimes

If international conflicts are unavoidable, is cyberwar better than a war with bombs and bullets? If so, then could a cyberattack be a war crime?

2017-09-25

Spy Satellites Just Became Much Smaller

Future spy satellites may unfold like origami birds, collecting image data along long, flat sensor arrays that weigh almost nothing.

2017-09-22

British NHS Sure To Be Hit By More Cyber Attacks

Healthcare managers have increased cybersecurity measures in expectation of further attacks from ‘organised hacktivists’.

2017-09-20

Angela Merkel’s Ally Caught In Cyber Attack As Elections Loom

A leader of German Chancellor Angela Merkel’s CDU party has her website hit by thousands of cyber-attacks from Russian IP addresses.

2017-09-25

AI Could Lead To World War

Tesla’s Elon Musk and Alphabet’s Mustafa Suleyman are calling for the ban on autonomous weapons.

2017-09-22

New Gigabit UK Broadband Trial

6 Areas in the UK will soon be trying out broadband technology that provides data at speeds approaching one gigabit per second (Gbps).

2017-09-22

Unmanned Helicopters Launched

Altus Intelligence’s new ORC2 unmanned helicopter is a small electric drone powered by battery capable of up to 60 minutes independent flight.

2017-09-18

Wearable Sensor Tech For Beat Police Officers

A new wearable sensor technology named Automatic Injury Detection (AID) provides on the spot rescue alerts when a police officer needs help.

2017-09-19

Canadian University Hit For $12m Phishing Scam

MacEwan University said its IT systems are secure after the institution was defrauded of nearly $12 million in a phishing scam, compounded by human error.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LEXFO

LEXFO

LEXFO specializes in the security of information systems, assisting clients in protecting information assets using an offensive and innovative approach.

Seric Systems

Seric Systems

Seric is a technology business specialising in security, infrastructure and data management.

TCDI

TCDI

TCDI specializes in computer forensics, eDiscovery and cybersecurity services.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

Falcongaze

Falcongaze

Falcongaze SecureTower is a comprehensive DLP solution for the protection of business against internal threats.

Futurae Technologies

Futurae Technologies

Futurae - enabling trust and invisible security for your users on all devices and applications. Strong customer authentication (SCA) made easy.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

SEMNet

SEMNet

SEMNet is an IT solutions provider and an infrastructure and security consulting firm.

SAM Seamless Network

SAM Seamless Network

SAM Seamless Network is a cybersecurity technology platform that protects the connected home, by tackling cyber security threats at the source.

National Cryptologic Foundation (NCF) - USA

National Cryptologic Foundation (NCF) - USA

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

Larsen & Toubro Infotech (LTI)

Larsen & Toubro Infotech (LTI)

LTI is a global technology consulting and digital solutions company with operations in 33 countries.

Rausch Advisory Services

Rausch Advisory Services

Rausch delivers solutions that address compliance, enterprise risk, information technology and human resource capital.

Kodem Security

Kodem Security

Our mission is to make AppSec simple. Meet the world’s first dynamic software composition analysis platform. Only Kodem uses runtime intelligence to determine application risk.

Antivirus Tales

Antivirus Tales

Antivirus Tales offers a platform to resolve all types of antivirus-related issues. The platform also provide various blog articles and informative guides to fix antivirus software errors.

Finlaw Associates

Finlaw Associates

Finlaw Associates is a trusted cybercrime law firm providing a wide range of taxation, legal, advisory and regulatory services to the financial, commercial and industrial communities.

Sacumen

Sacumen

Sacumen is a niche player in the cybersecurity market, solving critical problems for security product companies.

Evolve Business Group

Evolve Business Group

Evolve is an independently-owned managed network solutions provider, creating bespoke packages for customers globally since 2005.

Interpres Security

Interpres Security

Interpres Security operationalizes TTP-based threat intelligence and automates continuous exposure monitoring to help CISOs and security practitioners reduce threat exposure.