FREE TO VIEW


« Back to News

2016-12-09

Facebook, Microsoft, Twitter & YouTube: Collaborating To Remove Terrorist Content

Social media heavyweights announce they will cooperate on a plan to help limit the spread of terrorist content online.

2016-12-08

Rise Of The Machines

The Institute for Critical Infrastructure Technology (ICIT) say the Mirai Botnet attack on Dyn was just a rehearsal for an even bigger event.

2016-12-08

Next 3 Years Most Critical Of All For Technology

About 40% of CEOs think they will be running a completely different entity in the next three years.

2016-12-08

Banks Plan To Hoard Bitcoins

Big banks planning to stockpile bitcoins in order to pay off cyber criminals who threaten to bring down their critical IT systems.

2016-12-07

Just How Safe Is Online Banking?

Banking online is convenient, but how can you you protect against your accounts being emptied by fraudsters? Here is some useful advice.

2016-12-07

Yes, Russia Weaponised Social Media In The US Elections

Russia didn't just hack & leak documents from US political groups, it used social media as a weapon to influence perceptions about the election.

2016-12-07

Half The World's Population Is Not Yet On The Internet.

Room For Growth: More than half of the world's population still isn't using the Internet.

2016-12-07

What Are The Big Cyber Threats In 2017?

It looks like 2016 will be remembered as the year of the data breach and several obvious threats are likely to feature next year.

2016-12-06

AI Beating Humans? Not In My lifetime, Says Google Chief

The head of Google's cloud business says she doesn't expect machine intelligence to exceed that of humans during her lifetime.

2016-12-06

Power Of Nature To Enhance Internet Security

The next generation of cybersecurity is being enabled by the quantum nature of the universe itself.

2016-12-05

Snowden Loses In Norway

Edward Snowden's bid to guarantee that he would not be extradited to the US if he visited Norway has been rejected.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

Beyond Security

Beyond Security

Beyond Security is a leader in automated vulnerability assessment and compliance solutions - enabling customers to accurately assess and manage security weaknesses in their networks and applications.

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

Tenfold Software

Tenfold Software

Tenfold is the unique, centralized platform for managing user and permissions efficiently and automatically.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

CyberCareers.gov

CyberCareers.gov

CyberCareers.gov is a platform for Cybersecurity Job Seekers, Federal Hiring Managers and Supervisors, Current Federal Cybersecurity Employees, Students and Universities.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

QuSecure

QuSecure

QuSecure provides a software-driven security architecture that overlays your current infrastructure and provides next-generation security to protect your entire network from quantum threats.

Route1

Route1

Route1 is an advanced provider of secure data intelligence solutions to drive your business forward.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

Entro Security

Entro Security

Entro is the first holistic secrets security platform that detects, safeguards, and enriches with context your secrets across code, vaults, chats, and platforms.

Camms

Camms

Camms are a team of experienced professionals dedicated to providing innovative GRC software solutions that help organizations manage risk, make informed decisions, and drive positive change.

Atlantica Digital

Atlantica Digital

Atlantica design and create highly innovative software solutions and solid, scalable and secure IT infrastructures for a constantly evolving market.

Basalt

Basalt

Basalt provide qualified consulting services in information security, personnel security and physical security.