News

2017-01-16

Changing Other People's Flight Bookings Is Just Too Easy

The travel booking systems used by millions of people every day are woefully insecure and lack modern authentication methods.

2017-01-16

America’s Cyber Security Dilemma

Unintended Consequence: Is US military spending driving adversaries towards cheaper, cyber-focused means of response?

2017-01-16

German Police Will Squash Fake Online News

Pure Fiction: Combining exaggerated and unconnected incidents to create a picture of chaos and of foreigners promoting terrorism.

2017-01-16

Five Cybersecurity Predictions for 2017

The enterprise security Ninjas at Tanium list their top five predictions for cybersecurity in the year ahead.

2017-01-16

Police Connectivity: In-Car Video & Body Cameras

The ability of police systems to communicate with each other can result in better operational performance.

2017-01-13

AI and VR Are About To Transform Business

Artificial Intelligence & Virtual Reality are synonymous with gaming but they are going to change the way you communicate and do business.

2017-01-13

ISIS Just Can’t Resist Social Media

Social media is a key tool used by Jihadis to recruit followers, spread their radical interpretations of Islam and to promote outrage.

2017-01-13

Vladimir Putin & Donald Trump: Relationship Counselling

President-elect Trump is not yet in office and the allegations that President Putin interfered with the election in his favour are not going away.

2017-01-11

How AI Will Solve The Skills Shortage

Just as the Internet has revolutionised IT in the last 25 years, the current trajectory places AI squarely at the next technology inflection point.

2017-01-11

Russia Waging Cyberwar On Ukraine

Silent War: The Ukrainian President says Russian security services are waging a cyberwar against his country.

2017-01-11

Seamless Bio Electronic Devices

Bio Electronics: Harnessing biological rules to exchange information between the biochemistry of our bodies and the chemistry of our devices.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

rPeople Staffing

rPeople Staffing

rPeople provides direct placement in all areas of your organization, including and specializing in Technical and Executive hiring.

Linklaters LLP

Linklaters LLP

Linklaters is an international law firm. Practice areas include Information Management and Data Protection.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC) was founded to develop and implement information security practices in Dubai.

NESECO

NESECO

NESECO is an IT security integration and consulting firm providing security products, solutions, support, consulting, and training services.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

Bright Machines

Bright Machines

Bright Machines delivers intelligent, software-defined manufacturing by bringing together our flexible factory robots with intelligent software, production data and machine learning.

Center for Infrastructure Assurance and Security (CIAS)

Center for Infrastructure Assurance and Security (CIAS)

CIAS is developing the world's foremost center for multidisciplinary education and development of operational capabilities in the areas of infrastructure assurance and security.

Pelta Cyber Security

Pelta Cyber Security

Pelta Cyber Security is the cyber security consulting and solutions division of Softworld Inc. We provide staffing and recruitment services as well as consulting and solutions for outsourced projects.

Solvere One

Solvere One

Solvere One is a managed service provider (MSP) focused on corporate consulting and partnership.

Cybaverse

Cybaverse

Cybaverse (formerly North Star Cyber Security) was founded to create the perfect blend of a Managed Security Service Provider (MSSP) and a Cyber Security Consultancy in one.

Department of Homeland Security (DHS)

Department of Homeland Security (DHS)

The Department of Homeland Security has a vital mission: to secure the nation from the many threats we face. Our duties are wide-ranging, but our goal is clear - keeping America safe.

Hook Security

Hook Security

Setting a new standard in security awareness. Hook Security is a people-first company that uses psychological security training to help companies create security-aware culture.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

eGeneration

eGeneration

eGeneration is one of the leading technology solutions and system integration companies in Bangladesh.

Cypherleak

Cypherleak

Cypherleak provide Automated Cyber Risk Monitoring & Ai powered cyber recommendations.