News

2016-11-09

Healthcare Suffers From A Lack Of Security Awareness

Healthcare organisations have suffered 22 major data breaches in the past year, resulting in the exposure of millions of patients' information.

2016-11-09

Find The Hacker With Action Security Intelligence

Developing actionable security intelligence requires gathering multiple insights regarding the identity, methods & motivation of the attacker.

2016-11-07

IBM Think Ahead: Soon Watson AI Will Be Behind Every Decision

IBM's CEO Ginni Rometty thinks that soon, every important decision, will be made with the assistance of IBM Watson. What does she know?

2016-11-10

Education Is The Key To Minimise Cyber Risk For Business

Cyber criminals are constantly coming up with new ways to steal information; sometimes sophisticated, sometimes not, but all can be effective.

2016-11-14

Pentagon Wants to Use Social Media On the Battlefield

The US military think they can use AI to combine open-source intel from social media with satellite data to produce useful real time intelligence.

2016-10-31

Facebook’s Drone Ambitions Are Getting Bigger

Facebook plans to fly at least one small, wireless drone at an altitude of 400 feet around its headquarters in the coming months.

2016-11-10

Australian Government Networks Hacked

Australian government networks are clearly at high risk of cyber-attacks following a sequence of high profile hacks.

2016-11-08

Cyber Strikeback: Putin’s Aide Hacked

Retaliation? Secret correspondence belonging to a top aide to Russian President Vladimir Putin hacked and leaked.

2016-11-13

Is Apple Abandoning Macs?

Apple has neglected its Mac line in favour of other devices, leaving the Apple faithful wondering if the company is still committed to it?

2016-11-08

Otto's Self-driving Truck Delivers Its First Payload

For those doubting that autonomous vehicles are going to be driving alongside humans very soon, consider the first goods delivery made by Otto.

2016-11-14

Connected-Cars Could Cost Your Privacy

Connected cars are poised to become one of the biggest changes in the driving experience since the invention of the automobile.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Ovarro

Ovarro

Ovarro is the new name for Servelec Technologies and Primayer. Ovarro's technology is used throughout the world to monitor, control and manage critical and national infrastructure.

Delta Risk

Delta Risk

Delta Risk is a global provider of managed security services and cyber security risk management solutions to government and private sector clients.

Herbert Smith Freehills

Herbert Smith Freehills

Herbert Smith Freehills is a leading professional services including data protection and privacy.

SEPPmail

SEPPmail

SEPPmail is a patented e-mail encryption solution to secure your electronic communication.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

Veriti

Veriti

Veriti is a unified security posture management platform that integrates with your security solutions and proactively identifies and remediates potential risks and misconfigurations.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

ITQ Latam

ITQ Latam

ITQ Latam are specialists in cybersecurity, in a convergent ecosystem of technological solutions in infrastructure, cloud and security networks.

VENZA

VENZA

VENZA is a data protection company that can help organisations mitigate their vulnerabilities and ensure compliance, keeping guests and their data safe from breaches.

Methods

Methods

Methods is the leading digital transformation partner for the UK public sector. We care deeply about making our public services better and have been doing this for over 28 years.

Keyrus

Keyrus

Keyrus is a global consultancy that develops data and digital solutions for performance management.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.

Chorology

Chorology

Chorology is a leading provider of intelligently automated, data compliance and posture enforcement solutions.

NopalCyber

NopalCyber

NopalCyber makes cybersecurity manageable, affordable, reliable, and powerful for companies that need to be resilient and compliant.

Astra Cybertech

Astra Cybertech

At Astra Cybertech, we're more than just cybersecurity experts - we're your partners in safeguarding your digital assets.