FREE TO VIEW


« Back to News

2016-11-11

France Creates A Big Brother Data File

France has created a central database containing biometric and personal information of its citizens, raising concerns about privacy & freedom.

2016-11-09

Smartphone Attachment Can Detect Cancer

A portable sensor that uses a smartphone's camera to detect a biological indicator for several types of cancers with 99% accuracy.

2016-11-09

NATO Cyberwar: Establishing Rules Of Engagement

Counter-measures are operations that would otherwise be unlawful but can be used if the purpose is to stop another state from violating the law.

2016-11-09

Fears Of Hacked US Election Ebb Away

The US government assertions that Russia was destabilising the election and Donald Trump's claim the process was rigged have come to nothing.

2016-11-08

IoT Is A Cyberwar Nightmare

The world got a glimpse of the future when a large-scale cyberattack prevented access to many key websites, exposing big concerns about the IoT.

2016-11-08

International Police Start Crackdown On The Darknet

Law enforcement is staging a worlwide crackdown on DarkNet web sites, targeting merchants & customers of drugs and illicit goods.

2016-11-08

Big Hack At Tesco Bank – Money Vanished

Tesco Bank has halted online payments for current account customers after ‘over £10m’ was taken from 20,000 accounts.

2016-11-04

Is The CIA Ready For Post-Election Chaos?

The campaign to undermine the US presidential election, through hacking, cyberattacks and disinformation will have reached a peak on voting day.

2016-11-04

Healthcare Industry Lacks Basic Security Knowhow

Levels of security awareness in Healthcare are lower than average and this sector is particularly vulnerable to social engineering style attacks.

2016-11-04

New IoT Chips See, Think & Act Autonomously

The new generation of chips powering the Internet of Things have some quite remarkable capabilities.

2016-11-04

How Did WikiLeaks Get Clinton's Emails?

Julian Assange strongly denies US accusations that Russia is the source of the flood of hacked secret political emails released by Wikileaks.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Varonis

Varonis

Varonis provide a security software platform to let organizations track, visualize, analyze and protect their unstructured data.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

Deutsche Cyber-Sicherheitsorganisation (DCSO)

Deutsche Cyber-Sicherheitsorganisation (DCSO)

DCSO was founded in 2015 with the aim of counteracting the threats posed by globally organized cybercrime and state-controlled industrial espionage.

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

Expanse

Expanse

Expanse SaaS-delivered products plus service expertise reduce your internet edge risk to prevent breaches and successful attacks.

ReFirm Labs

ReFirm Labs

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring.

LSoft Technologies

LSoft Technologies

LSoft Technologies is a leader in data recovery software technologies.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

Venari Security

Venari Security

Venari is an award-winning cybersecurity SaaS provider that has developed an ETA (Encrypted Traffic Analysis) platform which fundamentally changes the way encrypted traffic is analysed.

SolidRun

SolidRun

SolidRun is a leading provider of computing and network technology designed to streamline the deployment of edge computing infrastructure and support embedded and IoT markets.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.

StrongBox.Academy

StrongBox.Academy

StrongBox.Academy provides cybersecurity training courses that are tailored to the specific needs and challenges of the industry.

Vernetzen

Vernetzen

Vernetzen is an industrial network and cybersecurity innovator focused on delivering practical solutions to connect and secure industry across the globe.

5S Technologies

5S Technologies

5S Technologies is a regional IT solutions and services provider based in Cary, NC and serving the Carolinas.

Ncontracts

Ncontracts

Our mission at Ncontracts is to continually improve our clients’ ability to manage risk and compliance.

Pantherun Technologies

Pantherun Technologies

Pantherun is a pioneering force in the realm of encryption technology and data protection solutions.