News

2016-08-31

Humans And The Robotic Future

Imagine a world where where nearly every online interaction takes place with a Siri, Alexa, Cortana or some soon-to-be-named artificial being.

2016-08-31

Edward Snowden Proposes Smartphone Privacy

Russia-based privacy advocate Edward Snowden has proposed a device that will inform users when their phones are disclosing their location.

2016-08-31

Psychological Warfare On Social Media

Twittersphere: Cyberwar between India and Kashmiri insurgents is hotting up with a big PsyOps element, focused on social media.

2016-08-30

Enabling Computer Super Intelligence

ARM is designing a semiconductor chip on which the number of transistors is projected to exceed the number of cells in a human brain.

2016-08-30

US Police Use Pokémon Go To Lure Criminals

There can’t be any doubts now of Pokémon Go’s world domination – even the police are getting in on the action.

2016-08-30

Businesses Need To Protect Data, Not Just Devices

Companies are moving away from platform-specific endpoint security technologies toward securing their applications & data everywhere.

2016-08-30

Over 50% Data Breaches Are Due To Human Error

Cyber-fraud is malicious while a breach caused by user ignorance is not.Their organisational consequence can be equally severe.

2016-08-29

London Police Chief Says Spy Agencies Face Terror Fight

London’s Police Chief says international security agencies can not prevent the type of terrorist attacks that have occurred in France & Germany.

2016-08-29

The Hidden Costs Of A Data Breach

Strengthening defenses against cyber-attackers is important. Companies must also prepare for reputational & financial damage lasting for years.

2016-08-29

Cyber War In Kashmir

An historic dispute over sovereignty in Kashmir is hotting and there is a growing cyber dimension.

2016-08-26

Artificial Intelligence Has Finally Emerged Into Real Life

Robotics is about embedding rules into a technological process. AI is about embedding analytics into the process.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NQA Certification

NQA Certification

NQA provides certification to a range of ISO standards including ISO 27001 for information security management.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

Praetorian

Praetorian

Praetorian is an offensive cybersecurity company whose mission is to prevent breaches before they occur.

Luxar Tech

Luxar Tech

Luxar's network visibility products enable enterprises and service providers to monitor network traffic, improve security and optimize efficiency.

A-SIT Secure Information Technology Center

A-SIT Secure Information Technology Center

A-SIT was founded in 1999 as a registered nonprofit association and is established as a competence center for IT-Security.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

Auxilium Cyber Security

Auxilium Cyber Security

Auxilium Cyber Security is independent information security consultancy company providing cyber security services tailored to meet the evolving needs of organizations worldwide.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

Connectitude

Connectitude

Connectitude IIoT Platform ™ is a complete solution for industrial IIoT.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

MSPAlliance

MSPAlliance

MSPAlliance is the world’s largest industry association and certification body for cloud computing and managed service professionals.

Spike Reply

Spike Reply

Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection.

Alkira

Alkira

Alkira has reinvented networking for the cloud era by delivering the network cloud, the first global unified network infrastructure with on-demand hybrid and multi-cloud connectivity.

Fusion Cyber

Fusion Cyber

Fusion Cyber educates students in Zero Trust Risk Management, Defense, and Cyber Offense that lead to taking industry-accepted cybersecurity certifications.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.