News

2016-10-20

Women Suspected To Attempt Next Terror Attack

After a string of arrests of radicalised women, Europe is preparing for the next IS inspired terror attacks to be carried out by female assassins.

2016-10-19

Cybersecurity Is Just A Lot Of Trouble For The General Public

Security Fatigue: It's National Cybersecurity Awareness Month in the US but a new study suggests that the general public are giving up.

2016-10-24

New Virus Attacks All Windows-Based Computers

A new type of malware capable of running on every version of MS Windows that can be detected by only two anti-virus engines.

2016-10-25

Chatbot To Teach You A Foreign Language

Écoutez et répétez après moi: Can a bot really be as good as a one-to-one tutor for learning foreign languages?

2016-10-24

Tanks To Have Remote-Control

Generic driverless technology that can work any vehicle with a steering wheel can be applied to armoured vehicles, including tanks.

2016-10-21

Cybersecurity Skills Gap in India

The shortage of trained cybersecurity professionals is a global challenge and India is no stranger to that situation.

2016-10-25

Industrial Robots Will Replace Manufacturing Jobs

Productivity gains from automation are eliminating manufacturing jobs in N. America faster than any foreign competition.

2016-10-24

Viv. An AI That Can Build Itself & Talks With People

Samsung has agreed to acquire Viv, an Artificial Intelligence business with powerful technology competitive with Apple's Siri.

2016-10-18

Future War - Extremely Fast And Lethal

Imagine war accelerated by AI and precision munitions, nested in a larger strategic sphere where everything is moving at Internet velocity.

2016-10-18

Trump Calls On US To Use Offensive Cyber Weapons

Donald Trump says the US should use offensive Cyber weapons in aggressive response to attacks from other nations.

2016-10-21

Virtual Reality - The Next Wave

Immersive technology creates empathy by putting the individual at the centre of every experience; mixed reality blends physical & digital elements.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clearpath Solutions Group

Clearpath Solutions Group

Clearpath Solutions Group expertise covers virtualization and data storage technologies, networking, security and cloud computing.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

Quaynote Communications

Quaynote Communications

Quaynote Communications is a specialist conference and communications company focused primarily on the maritime, yachting, aviation and security industries.

Project Moore

Project Moore

Project Moore is an Amsterdam law firm specialising in IT-law and privacy.

Cloudsine

Cloudsine

Cloudsine (formerly Banff Cyber Technologies) is a cloud technology company specializing in cloud adoption, security and innovation.

Soteria

Soteria

Soteria is a global leader in the development, integration and implementation of advanced cyber security, intelligence and IT solutions, delivering complete end-to-end solutions.

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command is responsible for Navy information network operations, offensive and defensive cyberspace operations, space operations and signals intelligence.

Swiss It Security Group

Swiss It Security Group

Swiss It Security Group offers clients complete IT security concepts based on innovative solutions and technology, with a focus on protection, detection and defence.

Theta432

Theta432

THETA432 is a cybersecurity firm that provides 24/7/365 managed prevention, detection, response, Hybrid SOC, cyber defense monitoring services with dynamically defined defense (3D™).

NACVIEW

NACVIEW

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections.

AB Handshake

AB Handshake

AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic.

ImagineX Consulting

ImagineX Consulting

ImagineX Consulting is a cybersecurity-focused boutique technology consultancy whose mission is to help our clients #BeBetter by reducing their corporate risk.

ABPCyber

ABPCyber

ABPCyber offers holistic cybersecurity solutions spanning DevSecOps, advisory and consultancy, designing and integration, managed operations, and cybersecurity investment optimization.

Entitle

Entitle

Entitle's SaaS-based platform automates how permissions are managed, enabling organizations to eliminate bottlenecks and implement robust cloud least privilege access.

C5 Technology

C5 Technology

C5 Technology specialises in the provision of networking, security, and infrastructure services to enterprises and government agencies.

Zynap

Zynap

Zynap is an Advanced AI-powered SaaS platform replicating cybercriminal tactics to predict, detect, and neutralize threats before they strike.