News

Please log in to browse. Login now
2015-05-16

IBM Breakthrough In Quantum Computing

IBM scientists have announced the two primary advances towards the quantum computer’s practical realization.

2015-05-12

US Republican Senators Come Out In Force To Keep NSA’s Domestic Surveillance Alive

Does the NSA’s expansive surveillance powers need to remain intact to keep Americans safe from terrorist threats?

2015-05-12

UK’s Internet Bandwidth Could Soon Be Choked

Current optical cable and switches will reach their capacity for data throughput by 2020.

2015-05-30

Cyber Vulnerability - Get Your Report for 2015

The growing tide of cyber attacks has begun to spawn a new awareness of current cyber risks to business.

2015-05-12

NSA’s Public Spying Revealed by Snowden Is Ruled Illegal.

A landmark US federal court decision clears the way for a full legal challenge against the NSA. Does this mean Snowden is Innocent?

2015-05-08

How Mobility Is Revolutionising Manufacturing

Ten ways that mobilisation is going to dramatically change manufacturing industry.

2015-05-04

Deloitte Mock a Cyberattack to Teach Business How to Respond

A security breach or big data loss can trigger an emergency for the entire business.

2015-05-04

'Killer Robots' Offer Both Risks & Advantages for Military Use

Policy analysts in Canada are grappling with limits on the military use of robots.

2015-05-06

Anonymous Hackers Taking On the Kremlin

Anonymous International release an online archive of around 40,000 text messages belonging to a powerful Kremlin official.

2015-05-06

UK Rail Signals Can Be Hacked To Cause Crashes

Rogue employee could hack the new rail system and cause a crash.

2015-05-05

Locked Shields: NATO Holds Major Cyber-Security Drill

The largest NATO cybersecurity exercise ever is underway.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Intelligence-sec

Intelligence-sec

Intelligence-Sec is a fully integrated Conferences and Exhibitions Company managing and producing topical events for the security industry.

Apcon

Apcon

Apcon's mission is to provide valuable network insights that enable security and network professionals to monitor, secure and protect their data in both physical and virtual environments.

Database Cyber Security Guard

Database Cyber Security Guard

Database Cyber Security Guard (aka Don't Be Breached) informs Security Professionals and DBAs of Zero Day, Ransomware and Data Breach attacks within milli-seconds

National Cyber Security Center (NCSC) - Hungary

National Cyber Security Center (NCSC) - Hungary

The National Cyber Security Center was established in 2015 by uniting the GovCERT-Hungary, National Electronic Information Security Authority (NEISA) and the Cyber Defence Management Authority (CDMA).

Arc4dia Labs

Arc4dia Labs

Arc4dia have developed SNOW, a cyber security solution to combat the world’s most sophisticated cyber threats.

th4ts3cur1ty.company

th4ts3cur1ty.company

th4ts3cur1ty.company specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

eaziSecurity

eaziSecurity

eaziSecurity has built an eco-system of technology and services that bring enterprise scale security solutions to the SME marketplace.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

Canadian Cyber Threat Exchange (CCTX)

Canadian Cyber Threat Exchange (CCTX)

The CCTX is Canada’s not-for-profit, private-sector cyber threat sharing hub and collaboration centre.

Trovent Security

Trovent Security

Trovent was founded with a clear goal: to support medium-sized companies in significantly increasing their IT security level.

Acumen

Acumen

Acumen's cyber security engineers protect your critical systems, in critical moments. We are here when you need us most.

Cribl

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.

CarbonHelix

CarbonHelix

CarbonHelix provides cybersecurity services from US-based security operations centers that meet the highest compliance requirements.

TrustNet

TrustNet

TrustNet helps mid-to-large firms build trust through top-tier cybersecurity, compliance, and consulting—offering complete managed services all in one place.