FREE TO VIEW


« Back to News

2017-08-31

You Might Need To Hire AI Expertise Sooner Than You Think

It is fast becoming a vital part of IT strategy and to make the most of AI in the enterprise, you have to have a strong team in place.

2017-08-24

Cyber Security Risks Of Cloud Computing

The global cloud market is expected to grow to $190+ billions by 2020. Increased cloud adoption calls for better understanding of cloud security threats.

2017-08-23

HBO Offers Hackers $250,000 'bug bounty'

HBO reportedly offered $250,000 in ransom to the group that hacked its servers under the guise of a “bug bounty”.

2017-08-22

Chinese Satellite Sends Hack-Proof Messages

The Micius communications satellite has successfully sent "hack-proof" messages using quantum encryption.

2017-08-14

Ukrainian Postal Service Hit By Cyber Attack

Ukraine's national postal service has been hit by a two-day-long cyber-attack targeting its online system that tracks parcels.

2017-08-22

Artificial Intelligence: A Warning

Elon Musk repeats his warning about the dangers of AI, saying it poses “vastly more risk” than the apparent nuclear capabilities of North Korea does.

2017-08-21

Loss Of Cyber Expertise Is A Problem For Trump

The Trump administration has lost significant individuals serving in top cybersecurity roles across the federal government. That's a problem.

2017-08-21

Fighting Digital Crime: Evolving Police Methods

As the cyber-crime landscape continues to evolve, methods of policing it must change as well.

2017-08-21

N. Korea Will Unleash Cyber Attacks On The US

US officials are increasingly concerned the rogue regime will respond to international pressure by lashing out with a weapon it has already mastered.

2017-08-18

Can Tech Solve The Brexit Border Puzzle?

Can technology create 'frictionless borders' so that importers and exporters will hardly notice any change when the UK separates from the EU?

2017-08-18

Terrorism, A Sea Change In Tactics

Barcelona Attack: At the heart of the issue is the use of social and encrypted networks in a social media enabled society. By Vasco Da Cruz Almador

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Institute for Critical Infrastructure Technology (ICIT)

Institute for Critical Infrastructure Technology (ICIT)

ICIT is a leading cybersecurity think tank providing objective research, advisory, and education to legislative, commercial, and public-sector cybersecurity stakeholders.

Norwegian Business & Industry Security Council (NSR)

Norwegian Business & Industry Security Council (NSR)

NSR is a member organization serving the Norwegian business sector in an advisory capacity on matters relating to crime and security including cyber.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

Syhunt Security

Syhunt Security

Syhunt is a leading player in the web application security field, delivering its assessment tools to a range of organizations across the globe.

Digital Ship

Digital Ship

Digital Ship provides news, information, conferences and events focused on digital ship systems, information technology and security relating to maritime operations.

United Biometrics

United Biometrics

United Biometrics is an anonymous and real-time authentication platform designed to stop the fraud for mobile payments, e-Commerce and applications.

Intrinsyc Technologies

Intrinsyc Technologies

Intrinsyc provides product development services and Edge Computing modules that are helping to take the Internet of Things products to the next level.

Montreal International

Montreal International

You’re an entrepreneur planning to launch a company in an innovative sector such as AI, cybersecurity, 'deeptech' or fintech? You’ve found the right place!

Point Predictive

Point Predictive

Point Predictive build Predictive Models using Artificial Intelligence and Machine Learning techniques that help our customers stop fraud and early payment default (EPD).

ADL Consulting

ADL Consulting

ADL Consulting provide information security-related consultancy and training support to businesses across the UK. Our services include ISO27001, GDPR, Cyber Essentials and training.

RMRF Tech

RMRF Tech

RMRF is a team of cybersecurity engineers and penetration testers which specializes in the development of solutions for early cyber threat detection and prevention.

Rootshell Security

Rootshell Security

Rootshell Security is transforming vulnerability management with its vendor-agnostic Prism Platform and industry-leading offensive security assessments.

Banyax

Banyax

Banyax provides 24×7 real-time Cyber Defense Center Services using the latest technology tools to provide state-of-the-art defense.

Fulcrum Technology Solutions

Fulcrum Technology Solutions

The Fulcrum team of technologists are recognized experts in the fields of IT Infrastructure Technology, Security, Service Management and Support.

Cool Waters Cyber

Cool Waters Cyber

Cool Waters Cyber manage cyber security governance, risk and compliance.

RAD Security

RAD Security

RAD Security (formerly KSOC) is a cloud native security company that empowers engineering and security teams to drive innovation so they can focus on growth versus security problems.