News

2016-11-19

Nude Celebrity Photo Hacker Jailed

“Celebgate” perpetrator who hacked the Apple iCloud would have been foiled by two-step authentication.

2016-11-10

Cybercrime in Canada

Cybercrime is top of mind for many Canadian small and medium-sized businesses (SMBs).

2016-11-18

Bitcoin Just Isn’t Anonymous Enough

The anonymity of bitcoin has gained it many criminal users. Now, though, it's looking like the digital currency isn’t quite anonymous enough.

2016-11-10

US launches Code.gov Software Code-sharing Website

Code.gov, is a US government website for promoting the sharing of custom-developed software code.

2016-11-22

Artificial Intelligence: AI Fact & Fiction

Artificial intelligence is the science of making smart machines and it has come a long way since the term was coined in the 1950s. Good or bad?

2016-11-30

US Cybersecurity Strategy In The Trump Era

The Trump Administration has an opportunity to update US national security policies. What might they do differently for cybersecurity?

2016-11-29

AI Needed To Prevent Cyber-Attacks On Healthcare

Healthcare is especially vulnerable to major attacks resulting in serious data breaches & this is a worldwide problem. What is to be to done?

2016-11-21

Welcome To A World Without Work (W3)

Automation, driverless cars and drones - a new age is dawning. Whether it is a wonderful one or a terrible one remains to be seen.

2016-11-21

NSA Chief Has A Special Phone For Top-Secret Messaging

There’s no such thing as a perfectly secure phone, especially if it also connects to the Internet.

2016-11-16

Could You Be A UK Cyber-Warrior?

A crack team of 50 'brilliant brains' is to be recruited by the UK Government to defend the country against hacking attacks.

2016-11-21

Overconfident: US Will Win A Cyber War With China

The Rand Corporation think that the US will soon have a clear advantage over China in cyber war scenarios set in the S.China sea.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

Axiomatics

Axiomatics

Axiomatics provides dynamic authorization and access control solutions to protect critical data assets.

ENVEIL

ENVEIL

ENVEIL’s technology is the first scalable commercial solution to cryptographically secure Data in Use.

OmniNet

OmniNet

OmniNet delivers the next generation of cybersecurity and is the only provider in the market to move the edge of small businesses to a virtual, omnipresent perimeter.

GuardianKey

GuardianKey

GuardianKey is a solution to protect systems against authentication attacks.

Intraprise Health

Intraprise Health

Intraprise Health is a Certified HITRUST Assessor and award-winning provider of health information security products and services.

ShorePoint

ShorePoint

ShorePoint is an elite cybersecurity firm dedicated to improving the cyber resilience of Federal agencies and their missions.

Palmchip

Palmchip

Palmchip is a Cyber Security, SOC and Software consulting company. We design and develop high performance and secure applications.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

tTech

tTech

tTech is the first and foremost company providing outsourced Information Technology solutions to businesses in Jamaica.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.

Vector Choice Technologies

Vector Choice Technologies

Vector Choice Technology Solutions has a long standing reputation in cyber security consulting since 2008.

Geobridge

Geobridge

Geobridge was one of the first information security solutions providers to support cryptography and payment applications for payment processors, financial institutions and retail organizations.

Applied Insight

Applied Insight

Applied Insight work closely with government agencies and industry to overcome technical and cultural hurdles to innovation, empowering them with the latest cloud, data and cyber capabilities.

SecuRedact

SecuRedact

SecuRedact is an AI-powered tool to detect and pseudonymize personal data in text and images. Fast, local, secure, and free to try.