FREE TO VIEW


« Back to News

2017-12-12

Bitcoin: UK And EU Will Crackdown On Crime & Tax Evasion.

Traders will have to disclose their identities, ending the anonymity that has made the currency attractive for drug dealing & other illegal activities.

2017-12-11

Russia Is Providing North Korea With Internet Connectivity

By supplying North Korean hackers with added bandwidth and improved capability Russia is promoting even more destructive cyber attacks.

2017-12-11

The Promise & Peril Of Trump’s Cyber Strategy

The Trump administration seems to be stepping back from the historic role of the USA in shaping & enforcing international rules in cyberspace.

2017-12-08

Australia To Challenge Facebook & Google Over Media Disruption

Australian media companies are being squeezed hard as advertising dollars follow eyeballs to the giant US digital distribution platforms.

2017-12-08

Mercenary Hackers Funded By Nation-States

The FBI say they cannot tell the difference between hackers motivated by criminal intent from state- sponsored hackers pursuing cyberwar.

2017-12-08

Fake News & Botnets: Russia Has Weaponised The Web

The core concept of cyberwar is psychological manipulation, executed with targeted digital disinformation to weaken a country from within.

2017-12-06

More Businesses Could Use Machine Learning

Few fields promise to “disrupt” life as we know it quite like machine learning, but many applications of machine learning technology go unseen.

2017-12-06

North Koreans Study Bitcoin

Pyongyang University, considered the breeding ground for N. Korea’s army of hackers, is now offering courses on crypto-currencies.

2017-12-06

China Intends To Be An AI Superpower

The present economic and military balance of power could change as China rushes to develop leading edge artificial intelligence technology.

2017-12-06

Facebook Delivers AI To Detect Suicidal Posts

Using a combination of AI, human moderators and crowdsourced reports, Facebook hopes to prevent suicidal tragedies.

2017-12-05

Staff Training Is Important But Does Not Reduce Cyber Risk

The human is the weakest link in cybersecurity and the answer is not more training. It is not to trust humans in the first place.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

We Watch Your Website

We Watch Your Website

We Watch Your Website provide website monitoring, protection, malware removal and root cause analysis services to help you keep your website secure.

Morphisec

Morphisec

Morphisec's world leading prevention-first software stops ransomware and other advanced attacks from endpoint to the cloud.

MKD-CIRT

MKD-CIRT

MKD-CIRT is the national Computer Incident Response Team for Macedonia.

Asoftnet

Asoftnet

Asoftnet are specialists in IT security, IT forensics, IT service, websites, applications and mobile solutions.

SCADASUDO

SCADASUDO

SCADASUDO is a cyber solution architecture and design office, established by leading experts in the field of OT (Industrial control) and IT (information Technology).

EuraTechnologies

EuraTechnologies

EuraTechnologies, the French incubator and accelerator, is a centre of excellence and innovation for startups and entrepreneurs with a focus on Digital, Data, Cybersecurity and IoT.

Next47

Next47

Next47 is a global venture firm, backed by Siemens, committed to turning today's impossible ideas into tomorrow's indispensable industries.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

DeepFactor

DeepFactor

DeepFactor is the industry’s first Continuous Observability platform enabling Engineering and AppSec teams to find and triage RUNTIME security, privacy, and compliance risks in your applications.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

Logiq Consulting

Logiq Consulting

Logiq Consulting provide a full range of Cyber Security, Information Assurance and System Engineering services.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

OpenAI

OpenAI

OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.

Dark Entry

Dark Entry

Dark Entry provide solutions to safeguard businesses, leveraging advanced technologies and intelligence-driven approaches to detect and mitigate risks associated with compromised data.