FREE TO VIEW


« Back to News

2015-03-06

Protecting Your Data Wherever It Goes

The Top 4 Places Your Files Are At Risk (Infographic) : Seclore

2015-03-06

What happens when the Internet of Things becomes AI?

When Stephen Hawking, Bill Gates and Elon Musk all agree on something, it’s worth paying attention.

2015-03-09

Snowden Ready to Return to the US 'if he can get a fair trial'

Former U.S. National Security Agency employee Edward Snowden is ready to return home if he is guaranteed a fair trial, says his lawyer.

2015-02-19

Memex – The new search tool for the Deep Web

DARPA has publicly presented for the first time a new set of search tools called Memex, which will improve also researches into the “Deep Web”.

2015-02-28

How News Cards Are Quietly Transforming The Web

Cards, a technology that collapses online content into digital containers for fast and easy consumption has begun a transformation across the web.

2015-01-22

‘Anonymous’ Call For Revenge On Charlie Hebdo Terrorists

“Anonymous from around the world have decided to declare war against you, terrorists”

2015-03-02

Oxford Cyber Risk for Leaders Programme

Any organisation that relies on computer networks, digital information, the Internet or an Intranet is vulnerable to cyber security risks.

2015-03-05

Google Cloud offers security scanning for customer apps

Google Cloud Security Scanner, now available as a free beta for Google App Engine users..

2015-03-02

How the US Military will fight ISIS on the Dark Web

The Dark Web is not so much a place as it is a method of achieving a level of anonymity online.

2015-03-02

CAUSE: Predictive Software to Counter Cyber Attacks

The intelligence community is holding a contest to design software that combs open source data to predict cyber attacks before they occur.

2015-03-02

Cybersecurity that thinks

Until recently, using the terms “data science” and “cybersecurity” in the same sentence would have seemed odd.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Foundation Futuristic Technologies (FFT)

Foundation Futuristic Technologies (FFT)

FFT is a global leader in computer forensics and digital investigation solutions.

Cyber Security Challenge UK

Cyber Security Challenge UK

Cyber Security Challenge UK is a series of national competitions, learning programmes, and networking initiatives designed to identify, inspire and enable more people to become cybersec professionals.

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

Cyemptive Technologies

Cyemptive Technologies

Cyemptive's CyberSlice technology preempts and remove threats before they take hold, in seconds, compared to other’s hours, days, weeks and even months.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

CyberPeace Foundation

CyberPeace Foundation

CPF is a think tank of cybersecurity and policy experts with the vision of pioneering Cyber Peace Initiatives to build collective resiliency against CyberCrimes and global threats of cyber warfare.

RNTrust

RNTrust

RNTrust provide solutions to meet today’s digital challenges utilizing digital technologies and services to make you more secured in digitally connected environment.

Twingate

Twingate

Twingate help organizations secure and manage access to their technology resources in a world where people work from anywhere.

ThrottleNet

ThrottleNet

ThrottleNet provides world-class managed IT services and cybersecurity to organizations in St. Louis and throughout Missouri.

Diversified Search Group - Alta Associates

Diversified Search Group - Alta Associates

Diversified Search Group is an industry leader in recruiting diverse, inclusive and transformational leadership for clients.

BugProve

BugProve

BugProve offers a firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.

Aegis9

Aegis9

Aegis9 is an Australian owned and sovereign consultancy that specialises in providing tailored security solutions for both public and private sector clients based on their specific needs.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.

Clear Ridge Defense

Clear Ridge Defense

Clear Ridge was founded in April 2015 with the mission and vision to support Joint, Service Cyber Components, and commercial clients in specialized cyber support.

Heritage Cyber World

Heritage Cyber World

Heritage Cyber World is a one stop solution for all your security needs that brings together a team of security experts and analysts to deliver high-class security services.

Tundra Managed Solutions

Tundra Managed Solutions

Tundra Managed Solutions is a comprehensive IT services division offering a wide range of managed solutions designed to meet the diverse needs of businesses.