FREE TO VIEW


« Back to News

2018-05-16

Your Next Bank Card is a Finger-Scanner

Biometric Authentication: People may forget their PINs but very rarely do they go out without their fingers.

2018-05-16

Getting The Most From Investing In AI

Artificial Intelligence is forcing companies to apply a business strategy that combines intelligent technologies and human talent to reach customers.

2018-05-16

Why Are So Few Women In Cybersecurity?

Males hold three out of four jobs in the tech world, but it is in cybersecurity where the lack of participation of women is most acute.

2018-05-15

Blockchain Is Transforming The Investment Business

Until recently, investors hardly knew what blockchain & crypto-currencies were. Now, blockchain is transforming finance & investing.

2018-05-15

Seminar: Next Steps For Cyber Security In The UK

London Thursday, 12th July. A timely opportunity to discuss key issues surrounding cyber security in the UK. CPD Certified.

2018-05-15

First GDPR. Now A New EU Cyber Regulation

The Network & Information Security (NIS) regulation is aimed at creating a base level of security for essential services within the EU.

2018-05-14

Real-Time AI Gets Close To A Brainwave

Microsoft Azure's Cloud Service introduces 'Project Brainwave' a hardware architecture designed to accelerate real-time AI calculations.

2018-05-14

Russian Hackers Try To Penetrate The Sun

Gotcha: A leading British newspaper has been targeted as new warnings about Russian sponsored hackers are issued by the NCSC .

2018-05-14

Artificial Intelligence Will Reshape Banking

As many as 70% of front-office jobs in the banking industry will be dislocated by AI and the required skills will be in technology, not finance.

2018-05-14

Canadian Tech Used To Censor The Internet

A little known Canadian business is behind a widespread technology used to filter access to the worldwide web in certain countries.

2018-05-14

Cyberattacks Focus On Big UK Charities

Charities are highly exposed to online risks: Seven in ten large UK charities have experienced cybersecurity breaches in the last 12 months.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

CONCERT

CONCERT

CONCERT is a Computer Emergency Response Team and cyber security information sharing network for companies, institutes and government in Korea.

e-Governance Academy (eGA)

e-Governance Academy (eGA)

eGA is a think tank and consultancy founded for the transfer of knowledge and best practice in e-governance, e-democracy and national cyber security.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

Cyber Security Challenge UK

Cyber Security Challenge UK

Cyber Security Challenge UK is a series of national competitions, learning programmes, and networking initiatives designed to identify, inspire and enable more people to become cybersec professionals.

CyberSec Hub - The Kosciuszko Institute

CyberSec Hub - The Kosciuszko Institute

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

In-Sec-M

In-Sec-M

In-Sec-M is a non-profit organization that brings together companies, learning and research institutions, and government actors to increase competitiveness of the Canadian cybersecurity industry.

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) protects Singapore from external threats and safeguards its interests in areas related to terrorism, cyber security, other transnational threats, and geopolitics

Tetra Defense

Tetra Defense

Tetra Defense is a leading incident response, cyber risk management and digital forensics firm.

Albania Lab

Albania Lab

Albania Lab is a consulting company focused on the development and delivery of digital solutions and IT services including cybersecurity.

CoreStack

CoreStack

CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.

Apex Systems

Apex Systems

Apex Systems is a world-class technology services business that incorporates industry insights and experience to deliver solutions that fulfill our clients’ digital visions.

Schellman

Schellman

Schellman is a leading provider of attestation and compliance services.

TeKnowledge

TeKnowledge

TeKnowledge enables governments and enterprises around the world to navigate the challenges with digital transformation today and tomorrow with elite cybersecurity protection and managed services.

Cyberscope

Cyberscope

Cyberscope is a Web3 security firm specializing in smart contract audits, crypto security audits, and blockchain vulnerability assessments.