News

2017-02-13

BYOD Security Is Critical For Business

The prevalence of bring-your-own-device culture in the corporate world means workers can be more productive & connected. More vulnerable, too.

2017-02-08

Tech Billionaires Give $20m For Artificial Intelligence Research

The founders of LinkedIn and eBay are donating a combined $20m to fund academic research aimed at ensuring the safety of AI.

2017-02-06

DARPA Working On Secure Data Sharing

DARPA is kicking off a project to create a new way to enable US troopsto securely send and receive sensitive information on their devices.

2017-02-08

Cyber Security Protection For Business

From encouraging a culture of caution, to backing up files, here's how SMEs can defend themselves against hacking threats.

2017-02-07

Botnets Have Infiltrated The Twitterverse

Twitter bots produce spam, provide fake followers and can manipulate debates and public opinion in insidious ways that are hard to track and prevent.

2017-02-07

Lloyds Bank Cyber Attack

Following a massive DDoS attack affecting millions of customers, Lloyds Bank have sought help from the UK National Cyber Security Centre.

2017-02-07

Russia’s Attack On Web Freedom

Safe in Moscow, Edward Snowden has said very little about the Russian security apparatus, which is more intrusive than that in Europe & the USA.

2017-02-07

US And UK Agree To Take On Islamic State In Cyberspace

Trump & May: 'Deepening intelligence and security cooperation and critically.. stepping up efforts to counter Daesh in cyberspace.'

2017-02-06

'Locked-in' Patients Enabled To Communicate

A brain-computer interface can read the thoughts of patients suffering Locked-In syndrome to answer simple yes-or-no questions.

2017-02-03

Big Data Analysis – Now Used For Politics…

Big data analysis has not only been contributing to decision making in the realms of business, health, and defense, but also in politics.

2017-02-03

Why Are Hackers After Healthcare Records?

Information hacked from a Financial Institution or Bank is quickly rendered useless. Classified Healthcare data has continued value lasting a lifetime.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ITQ

ITQ

ITQ is an IT consulting firm with a focus on the entire VMware-product portfolio with three main services: Professional Services, Support Services and Managed Services.

Security Current

Security Current

Security Current's proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.

Sentropi

Sentropi

Sentropi is an online protection solution against charge backs, account takeovers, identity thefts and online scams.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

Cybersecurity Tech Accord

Cybersecurity Tech Accord

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies.

Egnyte

Egnyte

Egnyte delivers secure content collaboration, compliant data protection and simple infrastructure modernization; all through a single SaaS solution.

Apozy

Apozy

Apozy replaces a secure web gateway to nullify phishing, malware and impersonation attacks.

Cube 5

Cube 5

The Cube 5 incubator, located at the Horst Görtz Institute for IT Security (HGI), supports IT security startups and people interested in starting a business in IT security.

Adzuna

Adzuna

Adzuna is a search engine for job ads used by over 10 million visitors per month that aims to list every job everywhere, including thousands of vacancies in Cybersecurity.

Aigner Business Solutions

Aigner Business Solutions

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

Catalyst Campus For Technology & Innovation

Catalyst Campus For Technology & Innovation

Catalyst Campus is a collaborative ecosystem to create community, spark innovation and stimulate business growth.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

CertX

CertX

CertX is a Swiss functional safety, cybersecurity and artificial intelligence certification body.