FREE TO VIEW


« Back to News

2018-03-13

The Pentagon Puts Google’s AI To Use

Open source AI technology originally developed by Google is finding its way into big budget US military programs.

2018-03-13

Philosophy Of The Information Age

Information, misinformation and fake news in the information age prompt some hard philosophical questions, with no clear answers.

2018-03-13

US Spy Chiefs Look For UK Guidance On Cybersecurity

Concerned over the vulnerability of US companies, US security chiefs are considering replicating Britain's unified National Cyber Security Centre.

2018-03-13

Further Cyberattacks On German Government Networks

While blaming Russian APT28 hackers Germany's security services have allowed the attack to continue in order to gather more information.

2018-03-09

NSA’s Global Spy Monitor

Security researchers have spotted scanning tools that the NSA use to detect other nation-state hackers on the machines it infects.

2018-03-06

N Korea Is A Bigger Cyber Threat Than Russia

North Korea poses a more considerable cyber-attack threat to the international community than Russia, say the experts at CrowdStrike.

2018-03-06

Combating The Threat Of Malicious AI

Without a coherent international response, AI technology created to derive deep insights could be misappropriated, with grave consequences.

2018-03-09

Artificial Intelligence Is Cyber Defence

AI can help spot trends, patterns and anomalies in data that the naked eye cannot discern to identify and mitigate proliferating new types of malware.

2018-03-07

Cybercriminals Use Fake Websites

Criminal tricks include websites disguised as crypto-currency exchanges or fake services offering cloud mining. But the users always lose their money.

2018-03-13

Does Fake News Affect Threat Intelligence?

The concept of ‘fake news’ has plagued media for the past couple of years, but what is its impact upon business-level cybersecurity?

2018-03-12

Autonomous Cars Hit The Road In California

Look - No Hands: Tech companies and others working on driverless vehicle systems will begin trialling their cars without a safety driver present.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Openminded (OPMD)

Openminded (OPMD)

Openminded is a French security and network services company.

Foundation Futuristic Technologies (FFT)

Foundation Futuristic Technologies (FFT)

FFT is a global leader in computer forensics and digital investigation solutions.

ISC2

ISC2

ISC2 is an international, non-profit membership association for information security leaders. Our information security certifications are recognized as the global standard for excellence.

SCIS Security

SCIS Security

SCIS Security provides affordable cyber security services and solutions to small to medium sized businesses and homes.

CSO GmbH

CSO GmbH

CSO GmbH provide specialist consultancy services in the area of IT security.

Office of the National Security Council (UVNS) - Croatia

Office of the National Security Council (UVNS) - Croatia

UVNS coordinates, harmonizes the adoption and controls the implementation of information security measures and standards in the Republic of Croatia.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

Bolster

Bolster

Bolster (formerly RedMarlin) is an AI-based cyber-security platform designed to detect phishing and fraudulent sites in real-time.

Adit Ventures

Adit Ventures

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT.

Qohash

Qohash

With a focus on data security, Qohash supports security, compliance and optimization use cases enhancing your risk management process.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

RealTyme

RealTyme

RealTyme is a secure communication and collaboration platform with privacy and human experience at its core.

Judy Security

Judy Security

Judy (formerly AaDya Security) provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

Neosoft

Neosoft

Néosoft is an independent digital transformation consulting group with expertise in Consulting & Agility, Cybersecurity, Data, DevOps, Infrastructure & Cloud and Software Engineering.

NSW IT Support

NSW IT Support

NSW IT Support: Your exclusive hub for comprehensive Business IT services in Sydney. Our skilled team ensures seamless technology solutions nationwide, consistently delivering top-tier IT support.

WBM Technologies

WBM Technologies

WBM Technologies is a Western Canadian leader in the provision of outcomes-driven information technology solutions.