FREE TO VIEW


« Back to News

2020-03-27

Rapid Deployment Of 5G Is A Headache

The transition to 5G increases both the speed and volume of data communication, but there are a number of important issues which are problematic.

2020-03-26

AI Can Give An Early Warning Of Coronavirus

When applied to unstructured data, Artificial Intelligence is better at simulating disease spread than algorithms that rely on public health data.

2020-03-25

How Does The CCPA Compare To The GDPR?

Both the GDPR and the CCPA emphasize the need for companies to implement user privacy protection, but there are important differences.

2020-03-24

Fronton: A Secret Russian Tool To Shut Down The Internet

Russia's national spy agency has powerful new tools that can shut down internet services by tapping into IoT connected smart devices.

2020-03-23

How Effective Is Your Threat Intelligence?

Treat intelligence helps organisations make informed decisions on how to prepare for, identify and prevent threats to their cyber security.

2020-03-23

Covid-19 Virus Impacts Home Working

The C-19 virus is being increasingly used as a subject to engage readers with phishing emails and deliver a range of other attack vectors.

2020-03-23

Remote Working Is On Suddenly On Trend

The adoption of secure technology to enable the flexibility of working from multi-locations and online collaboration is suddenly urgent.

2020-03-20

Warning: Coronavirus Scams Surging

Right now, there are growing serious concerns about the threats posed by the current Coronavirus situation and the risk of online fraud.

2020-03-20

Redefining OSINT To Win The Cybercrime War

As the quantity & complexity of data increases and criminals become more creative, the investigations industry must urgently respond. By Julie Clegg

2020-03-13

Coronavirus And Your Phone

If you haven't cleaned your phone in a while, think twice before holding it up to your face the next time you have a phone call.

2020-03-09

Why 5G Technology Is A Geopolitical Issue

Innovative use of software across 5G platforms raises problems, as the technology serves to widen the attack surface of the network.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Fieldfisher

Fieldfisher

Fieldfisher's Technology, Outsourcing & Privacy Group has class-leading expertise in privacy, data & cybersecurity, digital media, big data, the cloud, mobile payments and mobile apps.

Armadillo Sec

Armadillo Sec

Armadillo provide penetration testing and vulnerability assessment services.

Westminster eForum

Westminster eForum

Wesrtminster eForum runs a series of conferences on matters relating to the UKs Digital Strategy. Topics include Smart Cities and Cyber Security.

AppViewX

AppViewX

AppViewX is a global leader in the management, automation and orchestration of network services in data centers.

macmon secure

macmon secure

macmon secure develops network security software, focussing on Network Access Control.

AKS IT Services

AKS IT Services

AKS IT Services (an ISO 9001:2015 and ISO 27001:2013 certified company) is a leading IT Security Services and Solutions provider.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

Variti

Variti

Variti Intelligent Active Bot Protection technology — traffic analysis, detection and stopping of malicious bots in real-time and effective response to DDoS attacks.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

Cado Security

Cado Security

Cado Security is pushing digital forensics, and cyber incident response to the next level with an incident response software platform and specialist consulting services.

Flatt Security

Flatt Security

Flatt Security is a cyber security startup based in Japan providing security assessments and other cyber security services.

Sollensys

Sollensys

Sollensys is a leader in commercial blockchain applications. Our flagship product, The Blockchain Archive Server™ is the best defense against the devastating financial loss that ransomware causes.

CyberUSA

CyberUSA

CyberUSA is a collaboration of leaders and states focused on a common mission purpose of enabling innovation, education, workforce development, enhanced cyber readiness and resilience.

Advent One

Advent One

Advent One are recognised for solving intricate dilemmas, not only making technology work but building foundations that customers can grow upon in an effective and secure way.

Benchmark IT Services (BITS)

Benchmark IT Services (BITS)

BITS is a leading cyber security company in Australia. Our certified professionals work with you to keep your data assets safe and secure.

Hack-X Security

Hack-X Security

Hack-X Security provide IT risk assessment and Digital Security Services. We are a trusted standard for businesses that must protect their data from cyber-attacks.