News

2017-01-11

Russia Waging Cyberwar On Ukraine

Silent War: The Ukrainian President says Russian security services are waging a cyberwar against his country.

2017-01-11

Seamless Bio Electronic Devices

Bio Electronics: Harnessing biological rules to exchange information between the biochemistry of our bodies and the chemistry of our devices.

2017-01-11

The Digital Transformation Of The Humanitarian Sector

No industry is immune to being disrupted by technology. And that includes conflict and humanitarian relief. Opinion by Anje Kaspersen

2017-01-10

Surprise: Snowden Knows Some Russian Spies

Edward Snowden “has had and continues to have contact” with Russian intelligence services since arriving to safety in Moscow three years ago.

2017-01-10

Ransom Worm: The Next Level Of Cybersecurity

Holding your data hostage and seeking cash payment is bad enough. The next stage of ransomware is going to be even worse.

2017-01-10

Propaganda & Bias In Social Media News

The Fourth Industrial Revolution is beginning to pose some tough ethical questions. Can it be ensured that technology works for society?

2017-01-10

Shades of Watergate – The Fake Russian Hacking

Does the 1972 Watergate scandal cast light on current accusations of Russian hacking & threats to US critical infrastructure? Opinion by Annie Machon

2017-01-10

CIOs Defend Against Cybersecurity Threats Using Behavioral Analytics

Anomaly-detecting analytics can help anticipate and detect a variety of threats, including phishing scams and advanced persistent threats.

2017-01-09

Driverless Future Won't Start With Self-driving Cars

Look Out! You are more likely to see a driverless truck on the motorway before you see a self-driving car.

2017-01-09

Will It Be Possible To Hack Connected Nuclear Weapons?

Future nuclear warheads will be networked, with a greater potential for mishaps. Is that wise?

2017-01-09

CIOs Are Neglecting Process & Most Efficient Options

Improving business processes can lead to clear benefits in procuring operational efficiency and gaining a competitive business advantage.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

Conscio Technologies

Conscio Technologies

Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.

Evok

Evok

EVOK is an IT Service provider specialized in installing, maintaining and supporting IT infrastructures for SMB's in Switzerland.

Vaddy

Vaddy

Vaddy provide an automatic web vulnerability scanner for DevOps that performs robust security checks to ensure that web app code is secure.

Saudi Federation for Cyber Security and Programming (SAFCSP)

Saudi Federation for Cyber Security and Programming (SAFCSP)

SAFCSP is a national institution under the umbrella of the Saudi Arabian Olympic Committee, which seeks to build national and professional capabilities in the fields of cyber security and programming.

Smarttech247

Smarttech247

Smarttech247 deliver a range of cyber security solutions, including cognitive security services using IBM Watson for Cybersecurity, SIEM, Compliance & Governance, and Penetration Testing.

IdentityIQ

IdentityIQ

IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches.

SAIFE

SAIFE

SAIFE has adapted a Software Defined Perimeter approach and paired it with a Zero Trust model that defines access by the user, their device, and where they are located.

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

Cybrella

Cybrella

Cybrella offers professional cybersecurity services for small to medium sized businesses and to larger enterprises looking to expand their cybersecurity capabilities.

Redbot Security

Redbot Security

Redbot Security provides industry leading manual penetration testing. Protecting critical systems and data - red team attack and breach simulations, (OT) critical infrastructure testing.

NetGain Technologies

NetGain Technologies

NetGain Technologies helps small to medium-sized businesses gain access to expert IT talent. We provide strategies that use technology as a driving force behind business growth.

SMARTEST

SMARTEST

SMARTEST is a world-class IT solutions provider active in the most challenging and demanding industries such as the oil and gas industries.

Infoline Tec Group Berhad

Infoline Tec Group Berhad

Infoline Tec Group Berhad is principally involved in providing IT infrastructure solutions, cybersecurity service provider and solutions, managed IT and other IT services.

HTX (Home Team Science & Technology Agency)

HTX (Home Team Science & Technology Agency)

HTX brings together science and engineering capabilities to transform the homeland security landscape and keep Singapore safe.

TraitWare

TraitWare

The TraitWare mission is to increase user and company security while simplifying access to digital and physical resources through the elimination of the need for usernames and passwords.