FREE TO VIEW


« Back to News

2018-08-13

You Don't Need To Be A Hacker ...

You don't need to be a hacker to get a high-paying cybersecurity job. Many don't realize they have skills that are transferable to this field.

2018-08-16

Darktrace Discoveries Report 2018

Discover the subtle, novel threats that cyber AI neutralized in 2018, from a hacked car park kiosk to an insider-run bitcoin operation.

2018-08-09

Cyber AI In the Cloud: Securing New Computing Models, Applications & Devices

Darktrace: How AI technology is protecting cloud infrastructure from advanced cyber-threats, filling the security gap left by current approaches.

2018-08-06

Facebook Fakers Get Better At Covering Tracks

Creators of fake accounts and news pages on Facebook are learning from their mistakes and making themselves harder to track and identify.

2018-08-28

SamSam: $6 million Ransomware

Sophos say SamSam ransomware affected far more victims than first thought, successfully extorting several $million in ransom demands.

2018-08-23

Digital Resilience Is A Step Up From Cybersecurity

Business resilience means an organisation is able to adopt new systems and processes, ensuring continued competitiveness and business survival.

2018-09-02

Alaska Dusts Off Its Typewriters

Government workers in a borough of Alaska have turned to typewriters to do their jobs, after ransomware infected their computer systems.

2018-08-08

Dixons Carphone Data Breach Hits 10m Users

A data breach at electronics retailer Dixons Carphone is almost ten times larger than the company first thought.

2018-08-31

Surveillance Cameras That Spot Your Personality Type

AI can be used to analyse biometric data, like subtle on-camera eye movement, to predict personality traits better than random guessing.

2018-08-31

What Are Deepfakes?

The Internet now mediates every aspect of our lives, and an inability to trust anything we see could lead to an "end of truth."

2018-08-23

Phone Calls, Texts Or Email - How Do Millennials Communicate?

The fundamentals of good communication don’t change between generations, but personal voice communications are slipping down the priority list.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

A-SIT Secure Information Technology Center

A-SIT Secure Information Technology Center

A-SIT was founded in 1999 as a registered nonprofit association and is established as a competence center for IT-Security.

CommuniTake

CommuniTake

CommuniTake builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use.

Oxford BioChronometrics

Oxford BioChronometrics

By building profiles based on electronically Defined Natural Attributes, or e-DNA, Oxford BioChronometrics protects digital networks, communities, individuals and other online assets from fraud.

Open Raven

Open Raven

Open Raven is the cloud native data security platform that prevents breaches driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents.

Adit Ventures

Adit Ventures

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT.

Squad

Squad

Squad provides leading expertise to ensure protection against the most complex cyber threats. Combining the best practices of DevOps and Cybersecurity, we are committed to create a secured cyber space

NWN Carousel

NWN Carousel

NWN Carousel delivers AI-powered technology solutions for the modern workplace. From unified communications and intelligent infrastructure to robust cybersecurity.

Tailscale

Tailscale

Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly.

Sify Technologies

Sify Technologies

Sify is the largest ICT service provider, systems integrator, and all-in-one network solutions company on the Indian subcontinent.

Prime Technology Services

Prime Technology Services

Prime Tech are a group of Red Hat, Microsoft & Cisco Certified IT Professionals with an impressive track record of consistently delivering value to our corporate clients.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

VT Group (VTG)

VT Group (VTG)

VTG delivers force modernization and digital transformation solutions that expand America’s competitive advantage in the modern battlespace.

Fernao Group

Fernao Group

Fernao offer you all solutions from a single source - from cyber security, business resilience and digital infrastructure to cloud technologies and pentesting.

INT3L

INT3L

The INT3L group (formerly Defentek) is a provider of national security and intelligence solutions, systems and services.

Nyx Technology

Nyx Technology

Nyx Technology is your dedicated partner in navigating the intricate world of cyber security, providing you with cutting-edge threat intelligence to safeguard your digital assets.