FREE TO VIEW


« Back to News

2017-01-06

Virtual Reality Is Getting Real In 2017

Is VR is going to become the next major computing platform, in the same way that mobile phones have superceded desktop PCs?

2017-01-06

Company Boards Need To Get A Grip.

Corporate leaders, especially boards of directors, aren't taking the necessary actions to defend their companies against cyber attacks.

2017-01-06

Digital Forensics, Incident Response & Attribution

The cost of not taking cyber security seriously today is just like the cost of not having your business properly insured.

2017-01-05

Artificial Intelligence, Self-driving Cars & Cyberwar In 2017

If 2016 was a year of unprecedented disruption in the Technology sector, what does 2017 hold in store? More of the same....

2017-01-04

How Cyber Attacks Will Get Worse In 2017

It was thought 2016 would see more cybersecurity activity than 2015 and it did. Here are some of the escalated challenges to be faced in 2017.

2017-01-04

Russian Military Was Behind Hacking Clinton Campaign

Crowdstrike say they have evidence to link the Clinton campaign hacks with malware used by the Russian military intelligence team, Fancy Bear.

2017-01-03

Cyber Criminals Are Making $200k A Month

Recorded Future have been researching the dark web for cybecrime forums. It turns out the bad guys can make good money stealing from each other.

2017-01-03

Robots Can Build Weapons

Faster, cheaper and more accurate. Raytheon has changed the way it builds deadly missiles.

2017-01-03

The Worst Hacks In 2016

Before 2016, most network intrusions targeted enterprises & large corporations, but last year saw a much more diverse range of victims.

2016-12-30

How Russian Cyber Power Attacked The US

Who's To Blame? The FBI's failure to grasp the scope of the initial attacks on the Democratic party undercut efforts to minimize their impact.

2016-12-30

Obama Advises Trump To Train 100,000 Hackers

Obama recommends President-elect Trump to execute a comprehensive cybersecurity strategy, including the training of 100,000 white hat hackers.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

iXsystems

iXsystems

iXsystems is a leader in Open-Source enterprise server and storage solutions including Backup & Recovery to protect critical data.

Datto

Datto

Datto delivers a single toolbox of easy to use products and services designed specifically for managed service providers and the businesses they serve.

NICE Systems

NICE Systems

NICE Systems provide software solutions to ensure compliance, fight financial crime, and safeguard people and assets.

CERT.LV

CERT.LV

CERT.LV is the national Computer Emergency Response Team for Latvia.

Saudi Federation for Cyber Security and Programming (SAFCSP)

Saudi Federation for Cyber Security and Programming (SAFCSP)

SAFCSP is a national institution under the umbrella of the Saudi Arabian Olympic Committee, which seeks to build national and professional capabilities in the fields of cyber security and programming.

Innovative Solutions (IS)

Innovative Solutions (IS)

Innovative Solutions is a specialized professional services company delivering Information Security products and solutions for Saudi Arabia and the Gulf region.

Secure Soft

Secure Soft

Secure Soft are experts in Computer and Information Security with a presence in Peru, Colombia and Ecuador.

Sternum

Sternum

Sternum provides reliable and effective endpoint security for any IoT device, using robust technology and seamless integration.

Tapestry Technologies

Tapestry Technologies

Tapestry Technologies supports the Department of Defense in shaping its approach to cybersecurity.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

Bittnet Training

Bittnet Training

Bittnet Training is the leader in the IT Training market in Romania. We develop the IT skills of IT professionals as well as those who wish to start a career in IT.

ProArch

ProArch

ProArch is a global team of multidisciplinary experts in cloud, infrastructure, data analytics, cybersecurity, compliance, and software development.

Novem CS

Novem CS

Novem CS are bespoke cyber security specialists providing a highly effective and specialised approach to solving your cyber security challenges.

Disecto Technologies

Disecto Technologies

At Disecto, we provide SaaS based Data Discovery, Classification and a remediation solution for data privacy compliance.

Twilio

Twilio

Twilio are the customer layer for the internet, powering the most engaging interactions companies build for their customers. We provide simple tools that solve hard problems.

Securafy

Securafy

At Securafy, we understand how important it is to have the right IT partner by your side. For over 30 years, we’ve helped businesses stay secure, connected, and compliant.