FREE TO VIEW


« Back to News

2017-08-29

Cyber Criminals Have Access To Weapons Grade Hacking Tools

Businesses need to seriously rethink cyber defence with powerful nation-state attack hacking tools now in the hands of ordinary cyber criminals.

2017-08-29

Android Apps With Spy Software

Security researchers warn against using certain phone messenger applications which have the capability to steal data from the devices they infect.

2017-08-22

Very Few UK Girls Took Computing A-level

A worrying statistic for the tech industry: In freshly-released A-level data, only 9.8% of those completing a computing course were girls.

2017-08-21

4 Steps Toward A GDPR Compliance Audit

Many organisations are starting to feel stressed and perhaps a bit confused by the General Data Protection Regulation. Here's where to start.

2017-08-24

Organisations Need A Data Ethics Strategy

“Data ethics” can give companies a competitive edge by protecting personal data, especially when their target customers value social responsibility.

2017-08-23

The “augmented human” Concept Becomes Reality

We carry health sensors on our wrist, and our Apple Watch is becoming our personal physician. These concepts are transforming the insurance industry.

2017-09-01

A Robot Won’t Steal Your Job Just Yet…

The technology industry likes to talk about how automation is set to change the world. But amid all the futurism, one thing gets lost: actual robots.

2017-09-01

The AI Apocalypse

Adversarial attacks are an increasingly worrisome threat to the performance of artificial intelligence applications.

2017-08-24

Firms Underrate The ‘Seismic Aftershock’ Of An Attack

UK businesses are overconfident in their cybersecurity planning & underestimate the damage of the “seismic aftershock” following a breach.

2017-09-01

What is Machine Learning?

Building systems that learn from data is a better way to solve complex problems, given enough meaningful data to learn from.

2017-08-23

What Is A Good Cyber Strategy?

Cybersecurity has never been more important for business. Cyber-attacks are becoming ever more ambitious and a systematic response is needed.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI) is a premier federal law enforcement agency within the Department of Homeland Security (DHS).

RunSafe Security

RunSafe Security

RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

Matrix42

Matrix42

Matrix42 software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant.

3Elos

3Elos

3Elos operates in the Information Technology market with a focus on research, development, consulting, marketing and implementation of Information Security solutions.

IdentityIQ

IdentityIQ

IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches.

Cybersec Infohub

Cybersec Infohub

Cybersec Infohub is a Hong Kong government programme to enhance the exchange of cyber security information with industry and enterprises to jointly defend against cyber attacks.

C2SEC

C2SEC

C2Sec provides an innovative analytics platform that assesses and quantifies cyber risks in financial terms based on combining patented big data, AI, and cybersecurity technologies.

Ankura Consulting Group

Ankura Consulting Group

Ankura is a global expert services and advisory firm that delivers services and end-to-end solutions in a wide range of areas including cybersecurity and digital transformation.

D2 Network Associates (D2NA)

D2 Network Associates (D2NA)

D2NA help businesses deliver and achieve their goals, through innovative IT solutions, robust cyber security services and proactive IT managed services.

Silent Quadrant

Silent Quadrant

Silent Quadrant delivers incomparable cybersecurity consulting, digital transformation, and risk management within our purpose-driven clients - empowering them to be the most resilient entities.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

We Hack Purple

We Hack Purple

We Hack Purple is a Canadian company dedicated to helping anyone and everyone create secure software.

Scinary Cybersecurity

Scinary Cybersecurity

Scinary was founded in 2015 on the premise that cybersecurity should not be limited to just large corporations or large government entities.

Redport Information Assurance

Redport Information Assurance

Redport Information Assurance is an information assurance and cyber security solutions provider offering integrated business solutions for all levels of government.