News

2016-06-01

Growing Skepticism Over Drone Attacks

The UK is increasing the number of armed drones in service and new data suggests this is contributing to more innocent casualties.

2016-06-05

A New Front in Obama’s War on Whistleblowers

Fired Pentagon assistant inspector general John Crane is going public with allegations about senior officials actions against whistleblowers,

2016-05-31

Google Implements Neural Network Computing For Machine Learning

Google’s SyntaxNet is an open-source neural network framework that provides a foundation for Natural Language Understanding systems.

2016-05-31

Companies Should Share Cyberattack Information

Disclosure of data breaches might help strengthen cybersecurity for everyone.

2016-05-31

Iraq Shuts Internet During School Hours

Drastic Measures: Iraq has been turning off the internet across the country to stop children cheating in exams.

2016-05-31

Pentagon Testing Small Robot To Hunt Naval Mines

The US military has been looking for an underwater bomb disposal robot for years. It finally has one.

2016-05-30

Edward Snowden JoinsWith Jean Michel Jarre To Make Music About Cybersecurity

To see music and politics mix isn’t much of a rare occurrence.

2016-05-28

How ISIS Uses The Internet

Malware, messaging and more:The world’s major intelligence agencies are trying to figure out just how ISIS uses the internet.

2016-05-26

US Must Prepare For Cyber Warfare In Space

The developing stage for warfare is in cyberspace, but the next stage could well grow in a familiar frontier, space.

2016-06-04

Open Access To The Snowden Archive

Emulating the Panama Papers Archive, The Intercept Magazine are opening up access to the secret documents Edward Snowden took from the NSA.

2016-05-26

Both US Presidential Campaigns Hacked

Hackers working for foreign governments are targeting the main candidates in this year's presidential election.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Quotium

Quotium

Quotium provides automated testing technologies to make business software applications secure and robust.

Kualitatem

Kualitatem

Kualitatem Inc. is an independent software testing and information systems auditing company

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

HKCERT

HKCERT

HKCERT is the centre for coordination of computer security incident response for local enterprises and Internet Users in Hong Kong.

Kasada

Kasada

Kasada has developed a radical approach to defeating automated cyberthreats based on its unmatched understanding of the human minds behind them.

Naq Cyber

Naq Cyber

Naq is the number one platform for SMEs looking to become legally compliant and protect against cybercrime and other data-related incidents.

Udacity

Udacity

Udacity's mission is to train the world’s workforce in the careers of the future. Our programs range from beginner to expert levels and deliver the hands-on skills for real-world expertise.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

Securonix

Securonix

Securonix delivers a next generation security analytics and operations management platform for the modern era of big data and advanced cyber threats.

Mindsprint

Mindsprint

Mindsprint (formerly Olam Technology and Business Services - OTBS) are a leading edge technology and business services firm.

ELK Analytics

ELK Analytics

ELK Analytics is a specialized Managed Security Services Provider (MSSP) that focuses on endpoint security and monitoring & alerting for any type of structured or unstructured data.

Vantyr

Vantyr

Vantyr's core mission is to safeguard the business-led adoption of SaaS applications by automating the lifecycle management and security of non-human identities.

DYOPATH

DYOPATH

At DYOPATH we work with the single purpose of helping our clients combat the ongoing increase of cyber threats, the growth in more complex IT environments, and ever-increasing human capital shortages.

Karthik Consulting (KC)

Karthik Consulting (KC)

Karthik Consulting is a technology service provider specializing in IT services for the U.S. federal government.

OryxAlign

OryxAlign

OryxAlign offer managed IT and cyber security, cloud and digital transformation, and tailored professional and consulting services.