News

2015-07-30

Giant OPM Data Hack Did Blow U.S. Spies’ Cover

Not Just Social Security Numbers: more than one million fingerprints were stolen in U.S Federal Personnel data Hack.

2015-08-03

Don't Make These IT Mistakes in Your Organisation

Where dysfunctional rhythms and routines are the law of the land.

2015-08-06

Stagefright: New Android Vulnerability Dubbed 'heartbleed for mobile'

An attacker can take over the vast majority of Android phones with just a text message.

2015-08-03

Can You have Both Security & Privacy in the Internet Age?

Opinion By Anja Kaspersen: Head of Geopolitics & International Security at the World Economic Forum.

2015-07-29

Germany's New Infrastructure Cybersecurity Law

Federal agencies & providers of essential public services will have to comply with minimum standards of cyber-security.

2015-07-28

The BYOD Debate is Not Over

Most workers use personal mobile phones for work tasks, often outside of work hours.

2015-07-28

Hacking Team Inside Job

Italian police are investigating whether the attack on cyber-espionage firm Hacking Team could have been an inside job.

2015-07-28

Will Enforcing Encryption Backdoors Even Work?

Backdoors are “unworkable in practice, raise enormous legal and ethical questions & would undo progress on security...'

2015-07-30

Scientists Want to Keep AI Out of Weapons

Both Stephen Hawking & Steve Wozniak signed an open letter that begged leaders to stop a military robotics arms race.

2015-07-31

AI is as Dangerous as Nuclear Weapons

Leading computer scientists fear humanity might be 'driving off a cliff' with the rapid development of Artificial Intelligence.

2015-07-28

Cyber Threats to Civilian Flights

The emerging threat to commercial aviation today is vulnerability to cyber attack.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Wilson Sonsini Goodrich & Rosati (WSGR)

Wilson Sonsini Goodrich & Rosati (WSGR)

WSGR is the premier provider of legal services to technology, life sciences, and growth enterprises worldwide. Practice areas include cybersecurity and data protection.

Backup112

Backup112

Backup112 has been delivering professional cloud backup services since 2004.

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

macmon secure

macmon secure

macmon secure develops network security software, focussing on Network Access Control.

MPC Alliance

MPC Alliance

A consortium of developers and practitioners of multiparty computation (MPC), committed to accelerating market awareness and adoption of MPC to increase the security and privacy of online services.

Cyber Polygon

Cyber Polygon

Cyber Polygon is an annual online exercise which connects various global organisations to train their competencies and exchange best practices.

Havoc Shield

Havoc Shield

Havoc Shield is an all-in-one information security platform that includes everything a growing team needs to secure their remote workforce.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

Financial Services Information Sharing and Analysis Center (FS-ISAC)

Financial Services Information Sharing and Analysis Center (FS-ISAC)

The Financial Services Information Sharing and Analysis Center is the only global cyber intelligence sharing community solely focused on financial services.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

Accedian

Accedian

Accedian is a leader in performance analytics and end user experience solutions, dedicated to providing our customers with the ability to assure their digital infrastructure.

Sure Valley Ventures

Sure Valley Ventures

Sure Valley Ventures is an entrepreneur led venture capital fund focused on helping software entrepreneurs grow and scale businesses that will have a global impact.

Cognilytica

Cognilytica

Cognilytica’s Cognitive Project Management for AI (CPMAI) training and certification is recognized around the world as the best practices methodology for implementing successful AI & ML projects.

UM6P Ventures

UM6P Ventures

UM6P Ventures is an African based early-stage ventures firm operating two funds; a Digital Transformation fund and a Deeptech Ventures fund.

Sababa Security

Sababa Security

Sababa Security is the first Italian innovation cyber security vendor, that provides security products, training, and managed services to protect diverse IT and OT environments.

Xmore AI

Xmore AI

Xmore AI, an emerging disruptor in our incubation, is building AI models to optimize and secure IT with the mission of increasing efficiency and reducing costs.