NEWS > Cybersecurity News


« Back to News

2016-11-28

Google Technology To Treat UK Health Service Patients

London's Royal Free NHS hospital trust has teamed up with Google to share patient data using Deep Mind computing power.

2016-11-28

Has Cognitive Computing Arrived?

Cognitive computing has the potential to transform the way we view data analytics.

2016-11-28

Facebook Will Double UK Employees

Facebook will expand its presence in the UK by 50% when it opens its new London headquarters in 2017, the US technology giant has announced.

2016-11-25

The British IP Bill & Protection From Government Snoopers

The UK Investigatory Powers Act, aka 'the snoopers charter' passes in to law in December. It basically removes your right to online privacy.

2016-11-22

Google & Facebook Ban Fake News Sites

It's too late now: Google and Facebook are taking steps to control fake news by closing down access to their advertising networks.

2016-11-22

Spies Use Tinder

Surveillance and infiltration are not new tactics and collecting data from social media shows how the internet is bringing it all to a whole new level.

2016-11-22

Three Step Pogram: Pre-Breach Remedies To Contain The Costs Of A Cyber Attack

Data breaches are very costly. Organisations should consider three basic steps to ensure they are prepared to remedy a future breach.

2016-11-21

Was Donald Trump's Surprise Victory Hidden In The Data?

A dawning realisation that the Technology industry missed something fundamental about the fears & motivations of the people who use its products.

2016-11-24

The Internet of Things Must Not Be Allowed To Turn Into The Internet of Trouble

The lack of consumer awareness combined with a dearth of regulation over web connected devices is a recipe for IoT disaster.

2016-11-25

US Army Command Learning Cyberwar From Social Media

Young, social media-using soldiers may be the linchpin in the US Army's efforts to use cyberwar networks & virtual effects against enemies.

2016-11-24

Some Observations On Britain's New Cyber Security Strategy

A new strategy document spells out an assertive posture by a UK government that seems wary of sharing intelligence capabilities between allies.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

We Watch Your Website

We Watch Your Website

We Watch Your Website provide website monitoring, protection, malware removal and root cause analysis services to help you keep your website secure.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

A-SIT Secure Information Technology Center

A-SIT Secure Information Technology Center

A-SIT was founded in 1999 as a registered nonprofit association and is established as a competence center for IT-Security.

4N6

4N6

4N6 is a privately-owned firm founded with the goal of providing expert knowledge of computer forensics.

Aviva

Aviva

Aviva provides Cyber Liability cover for small to mid-market customers to help combat the threat of data and privacy breach.

Infodas

Infodas

Infodas provides Cybersecurity and IT consulting / system integration services as well as a range of innovative Cybersecurity products to public sector and commercial clients.

Garner Products

Garner Products

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination.

Onclave Networks

Onclave Networks

Onclave Networks is a global cybersecurity leader, transforming the future of securing all IT/OT devices and systems.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

GuardDog.ai

GuardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

Prime Technology Services

Prime Technology Services

Prime Tech are a group of Red Hat, Microsoft & Cisco Certified IT Professionals with an impressive track record of consistently delivering value to our corporate clients.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.