FREE TO VIEW


« Back to News

2017-05-22

What Happens If Criminals & Terrorists Get To Use AI

A Sinister Agenda: Criminals could deploy Artificial Intelligence to commit "terrorist acts or murders".

2017-05-23

What Healthcare CISOs Should Know

Protected health information (PHI) is more lucrative on the dark web than other form of personally identifiable information.

2017-05-29

Three Cybersecurity Trends Business Should Address

The cybersecurity landscape grows more complex daily: Hackers unleash increasingly intricate & formidable attacks, on mission critical systems.

2017-05-29

UK Robotics, AI & 3D Printing

Winning the next industrial revolution is a big prize: a thriving manufacturing sector, highly skilled jobs & greater productivity, fueling growth.

2017-05-26

We Are Not Paid Agents of Russia…

The anonymous authors of Russian propaganda and fake news on Facebook and other social media do it for love, not money.

2017-05-17

Intelligence In The Age of Cyber Warfare

Today’s cyber threats are invisible and anonymous and this is causing a revolution in defence and security techniques.

2017-05-24

Google Neutralizes Phishing Scam

Quick Detection & Respone: A phishing scam used Google Docs in an attack against at least 1 million Gmail users.

2017-05-25

Government Sponsored Cyber-insecurity Is A Gift For Hackers

Governments themselves, via their intelligence agencies,are responsible for creating vulnerabilities in our communication networks.

2017-05-23

Uber Faces A Criminal Probe In The US

Ride-sharing firm Uber firm is accused of using "secret" software that lets it operate in regions where its service is banned or restricted.

2017-05-22

The Difference Between Cyberspace & The Internet

The two terms are sometimes used interchangeably, although they have different meanings.

2017-05-22

Cybersecurity Has A Serious Talent Shortage

Businesses should open themselves up to applicants whose non-traditional backgrounds mean they could bring challenging new ideas.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Riverbed Technology

Riverbed Technology

The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, accelerate and remediate the performance of any network for any application.

InfoSecurity Magazine

InfoSecurity Magazine

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry.

SISA

SISA

SISA is a global forensics-driven cybersecurity solutions company, trusted by leading organizations for securing their businesses with robust preventive and corrective cybersecurity solutions.

National Cyber and Information Security Agency (NUKIB) - Czech Republic

National Cyber and Information Security Agency (NUKIB) - Czech Republic

NUKIB is the central Czech government body for cyber security, the protection of classified information in the area of information and communication systems and cryptographic protection.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

CERT.lu

CERT.lu

CERT.lu is an initiative to enhance cyber security practices and techniques, and support security professionals in Luxembourg.

SevenShift

SevenShift

SevenShift is a security consulting firm with a wealth of experience in the worlds of Cybersecurity and Internet of Things (IoT).

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

Luxembourg House of Financial Technology (LHoFT)

Luxembourg House of Financial Technology (LHoFT)

Offering start-up incubation, co-working spaces including a soft-landing platform, the LHoFT connects and creates value for the entire Luxembourg FinTech ecosystem.

Nagios

Nagios

Nagios is a powerful tool that provides you with instant awareness of your organization’s mission-critical IT infrastructure.

Josef Ressel Centre for Intelligent & Secure Industrial Automation

Josef Ressel Centre for Intelligent & Secure Industrial Automation

The Josef Ressel Centre for Intelligent and Secure Industrial Automation investigates the fundamentals of digital assistants for industrial machines that enable intelligent and secure operation.

Spirit Technology Solutions

Spirit Technology Solutions

Spirit Technology Solutions is a modern workplace services provider committed to delivering solutions that embody our core principles of security, sustainability, and scalability.

XBOW

XBOW

XBOW brings AI to offensive security, augmenting the work of bug hunters and security researchers.

Triovega

Triovega

Triovega are a leading provider for production security and efficiency. Our solutions enhance OT security, and reduce production downtime.

SKADI Cyber Defense

SKADI Cyber Defense

At SKADI Cyber Defense, we specialize in enterprise-grade cybersecurity solutions tailored for small to medium businesses.

Neural Defend

Neural Defend

Neural Defend is a deepfake detection technology with proprietary algorithms and an AI agentic multi-layered of solution.