News

2017-04-11

Dubai Tests Autonomous Aerial Vehicle

Another step towards innovative and smart mobility solutions for reducing city traffic congestion using passenger drones.

2017-04-07

Facial Recognition Technologies

US Homeland Security is rushing to equip airports with biometric security systems, including sophisticated facial recognition software.

2017-02-21

Hard To Keep The Cloud Safe Without Skills

IT managers are finding it difficult to keep their applications and data safe in the cloud, and many are slowing cloud adoption because of it.

2017-07-07

Robot Monitors in Homes of the Elderly

Robotic movement sensing systems in the homes of elderly people can predict when a person is at high risk.

2017-03-29

Facebook Algorithms Will Identify Terrorists

Facebook founder Mark Zuckerberg has outlined a plan to let Artificial Intelligence software review content posted on the global social network.

2017-03-01

Bitcoin Is Increasing Ransom Attacks

There are a few good reasons to use Bitcoin: It’s global, private and won’t bulk up your wallet. But there’s another more sinister perk.

2017-02-21

Queen opens Centre to protect against Attacks

The Queen was shown how hackers could target the UK's electricity supply as she opened a centre to protect the nation from cyber-attacks.

2017-05-01

Dell Says Security Is Plaguing Business

Michael Dell: Security is not a technology problem, but a business problem.

2017-02-21

Murderer's girlfriend got Police job to access files

A woman who got a job at UK’s Hammersmith Police station so she could data track a witness whose evidence helped convict her gangster boyfriend of murder has been jailed.

2017-04-11

AI Art - Electronic Rembrandt Creation

Dutch Master: Replicating Rembrandt's artistic techniques to re-create a famous masterpiece using software and a 3-D Printer.

2017-04-05

The Cusp Of Merging Human With Machine

We are at the point where computers and machines are no longer going to be simply tools. Computers are becoming, literally, part of us.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

National Trading Standards eCrime Team (NTSeCT) - United Kingdom

National Trading Standards eCrime Team (NTSeCT) - United Kingdom

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email.

HackLabs

HackLabs

HackLabs is a penetration testing company providing services for network security, web application security and social engineering testing.

Claroty

Claroty

Claroty was conceived to secure and optimize OT networks that run the world’s most critical infrastructures.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

Council of Europe Convention on Cybercrime

Council of Europe Convention on Cybercrime

The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime.

OCM Business Systems

OCM Business Systems

OCM are experts in the safe, secure and responsible disposal of IT & EPoS assets.

ePlus

ePlus

ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk and empowering digital transformation.

Naoris Protocol

Naoris Protocol

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

Security BSides

Security BSides

Security BSides is the first grass roots, DIY, open security conference in the world!. BSides is a community-driven framework for building events for and by information security community members.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

Center for Information Technology Policy (CITP) - Princeton University

Center for Information Technology Policy (CITP) - Princeton University

The Center for Information Technology Policy at Princeton University is a nexus of expertise in technology, engineering, public policy, and the social sciences.

Syracom

Syracom

syracom is a consultancy firm specialized in development of efficient business processes. With our expertise and IT competence, we develop tailored solutions for customers in various industries.

Matrium Technologies

Matrium Technologies

Matrium Technologies has been a leading provider of technology solutions since 1991, with a strong industry background in Network Testing, Network Visibility and Security.

tTech

tTech

tTech is the first and foremost company providing outsourced Information Technology solutions to businesses in Jamaica.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Balance Theory

Balance Theory

Balance Theory provides the knowledge infrastructure and collaboration center for the cybersecurity community. A networked community to build better cybersecurity outcomes.