News

2016-04-11

Will Capitalism Survive The Robot Revolution?

If 90 percent of human jobs are replaced by robots in the next 50 years, will capitalism remain the ideal economic system?

2016-04-11

Eight Reasons Why US CEOs Care About New EU Privacy Laws

A major change is on the way in how American companies must handle European citizens’ personal data.

2016-04-11

Taliban App Removed From Google Store

Alemarah, an app for Android phones created by Islamist fundamentalist group the Taliban, has been removed from Google's Play Store.

2016-04-14

The Darkest Web

TOR is an essential tool for carrying out investigations in law enforcement. It is also used by criminals. Opinion by Max Vetter (distressing content)

2016-04-08

WhatsApp Implements Encryption

A victory for privacy has been won after Whatsapp’s decision to encrypt end to end messaging.

2016-04-06

Biggest Data Leak Ever Exposes World's Most Rich & Powerful

An obscure law firm in Central America is the source of what's being called the largest information leak in history.

2016-04-11

27% Of Known Malware First Appeared In 2015

PandaLabs, the R&D laboratory of Panda Security, both detected and neutralized more than 84 million new malware samples throughout 2015.

2016-04-06

UK Surveillance Powers Bill Could Force Startups To Build In Backdoors

The UK's proposed new surveillance law enables state agencies to compel even very small startups to build backdoors into their systems.

2016-04-11

CIOs Fear Fines From New EU Data Laws

CIOs are concerned their current security policies put them at risk of serious fines under new European data protection laws.

2016-04-11

Is Breach Notification Part Of Your Response Plan?

Is customer-facing breach notification and response a part of your incident response plan? It should be!

2016-04-07

Typo Thwarts Hackers In $1B Cyber Heist

It was just a few letters off: Someone misspelled “foundation” as “fandation” on an online payment transfer request for $1 billion .

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

SecuriThings

SecuriThings

SecuriThings is a User and Entity Behavioral Analytics (UEBA) solution for IoT security.

International School of IT Security (ISITS)

International School of IT Security (ISITS)

The International School of IT Security (ISITS) is a leading provider of professional training in the field of IT Security.

Vade Secure

Vade Secure

Vade Secure provides protection against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware.

Digital Innovation Hub Slovenia (DIH)

Digital Innovation Hub Slovenia (DIH)

DIH Slovenia is a central hub providing services to grow digital competencies in areas including robotics, IoT, cyberphysical systems and cybersecurity.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

LeadingIT

LeadingIT

Leading IT provides IT support, cloud computing, email support, cybersecurity, networking and firewall services to Chicagoland businesses.

Police CyberAlarm

Police CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

Ankura Consulting Group

Ankura Consulting Group

Ankura is a global expert services and advisory firm that delivers services and end-to-end solutions in a wide range of areas including cybersecurity and digital transformation.

OpenAVN (DefenseArk)

OpenAVN (DefenseArk)

Defending your life online, keeping your data safe and private. We detect digital threats magnitudes faster than the leading antivirus software.

Crygma

Crygma

CRYGMA Quantum-Resistant Cryptographic Machines, the new standard in data encryption.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Auto-ISAC provides a forum for companies to analyze and identify threats sooner and share solutions that enhance vehicle cybersecurity.

Oxford Information Labs (OXIL)

Oxford Information Labs (OXIL)

Oxford Information Labs brings together world-class software programmers and policy experts to provide a unique mix of expertise and hands on technical solutions.

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre is the jurisdiction's Cyber Emergency Response Team (CERT) and national technical authority for cyber security.

BeamSec

BeamSec

BeamSec is a cybersecurity solutions provider committed to addressing the human element of risk against the evolving landscape of email-based cyber threats.