FREE TO VIEW


« Back to News

2018-07-03

Trump Backs Russia On Election Interference

President Trump contradicts the US intelligence establishment's conclusions about Russian interference in the 2016 Presidential elections.

2018-07-02

Google AI To Predict Patient Healthcare Outcomes

Google has a tool that could forecast patient outcomes, how long they may stay in hospitals, odds of re-admission and chances they will die.

2018-07-02

Israel Gets 20% Of Global Cybersecurity Investment

Prime Minister Netanyahu claims that surging investment in the emergent Israeli cybersecurity industry has tangible benefits for national defence.

2018-07-02

By 2020 US Immigration Will Be Digitised

Can an alliance of US Army lawyers, language processing technology and facial recognition fix the US immigration crisis? It seems unlikely.

2018-07-10

So Much Hot Air About Virtual Currencies

Rhetoric on virtual currencies has centred on risks and threats. But the technology also has the potential to promote financial inclusion.

2018-07-02

Get Started with Predictive Analytics

Many businesses don't fully understand the holistic view predictive analytics can bring to their organisation. They need to try harder.

2018-07-02

What War Games Tell Us About The Use Of Cyber Weapons

The US defence establishment have been gaming cyber warfare to find out if cyber weapons are equally as destructive as conventional weapons.

2018-06-29

Cyber Attackers Tunnel Into Financial Services Firms

Global financial services organisations are targeted by sophisticated cyber attackers to steal critical data and personally-identifiable information.

2018-06-29

Cybersecurity Issues For Open Banking

Only a standardised, industry-wide format will give the security and assure the level of trust crucial to the success of the Open Banking initiative.

2018-06-28

Effective Data Security Is A Team Effort

Delivering effective data security in today’s business environment can be challenging. To achieve it takes teamwork and communication.

2018-06-28

IBM’s AI Can Argue With Humans

Bringing practical applications to AI technology has proven difficult and IBM's Project Debater shows there is a long way to go.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Bulb Security

Bulb Security

Whether your internal red team or penetration testing team needs training, or you lack internal resources and need an outsourced penetration test, Bulb Security can help.

VMworld

VMworld

VMworld is a global conference for virtualization and cloud computing, including associated security issues.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

ANTIC is responsible for regulating the activities of electronic security and regulation of the Internet in Cameroon.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

J2 Software

J2 Software

J2 Software is a leading African Information Security and ICT business providing information security, governance, risk and compliance solutions.

Cyberra Legal Services (CLS)

Cyberra Legal Services (CLS)

Cyberra Legal Services provides cyber law advisory, cyber crime consultancy, cyber law compliance audit, cyber security, cyber forensics and cyber training services.

Axcient

Axcient

Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven Business Availability suite.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

A3Sec

A3Sec

A3Sec provides professional solutions in the areas of Cybersecurity, Device Monitoring, Business Intelligence and Big Data.

Fortiphyd Logic

Fortiphyd Logic

Fortiphyd Logic equips operators of the power grid, oil & gas, and other critical infrastructure with the tools and training they need to defend their industrial networks from advanced cyberattacks.

Keysight Technologies

Keysight Technologies

Keysight is dedicated to providing tomorrow’s test technologies today, enabling our customers to connect and secure the world with their innovations.

Spyderbat

Spyderbat

Spyderbat ATI closes the manual investigation gap between detection and response by instantly presenting causally connected threat activity to security analysts at the onset of an investigation.

Information Services Group (ISG)

Information Services Group (ISG)

As a leading global research and advisory firm, ISG partners with our clients to determine a future vision, lead rapid change and realize the value of your digital investments at scale.

Tarlogic

Tarlogic

Tarlogic works to protect and defend your security with the highest quality technical team with next generation solutions to achieve the best protection.

Vivid Computing Solutions

Vivid Computing Solutions

At Vivid Computing Solutions we provide comprehensive solutions that keep your business running efficiently and securely.