News

2016-10-25

FBI Using Big Data To Predict Terrorism

Recent terrorist attacks have quickened the pace for US Law enforcement to use predictive analyitcs and big data mining techniques.

2016-10-24

Artificial Intelligence Will Be A Critical Economic Driver

AI is an increasingly critical technology that can fight cyberattacks, upgrade weapons of war, improve health care & transport systems.

2016-10-21

Ecuador Cut WikiLeaks Assange's Internet Connection

Diplomatic Incident: Ecuador fears their London Embassy's unexpected guest is trying to interfere with the US Presidential election.

2016-10-19

Pentagon Creates New 5,000 Strong Cyber Force

Formation of the Pentagon's new Cyber Mission Force is a key step in improving the US’s ability to respond to hacks by overseas adversaries.

2016-10-19

Dealing With Insider Data Theft

To learn that your company's confidential data was stolen, not by a hacker, but by an employee, is a nightmare scenario nobody wants to face.

2016-10-19

Stolen NSA Hacking Tools For Sale In Bizarre Auction

The hackers who are auctioning off Cyber-weapons allegedly stolen from the NSA are growing annoyed and want cash.

2016-10-19

Overwhelming Cyber Attacks On Healthcare

Healthcare organisations struggle to manage the risks of massive data breaches, which are hard to detect & often take months to discover.

2016-10-20

Women Suspected To Attempt Next Terror Attack

After a string of arrests of radicalised women, Europe is preparing for the next IS inspired terror attacks to be carried out by female assassins.

2016-10-19

Cybersecurity Is Just A Lot Of Trouble For The General Public

Security Fatigue: It's National Cybersecurity Awareness Month in the US but a new study suggests that the general public are giving up.

2016-10-24

New Virus Attacks All Windows-Based Computers

A new type of malware capable of running on every version of MS Windows that can be detected by only two anti-virus engines.

2016-10-25

Chatbot To Teach You A Foreign Language

Écoutez et répétez après moi: Can a bot really be as good as a one-to-one tutor for learning foreign languages?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Swivel Secure

Swivel Secure

Swivel Secure is an award winning provider of multi-factor authentication solutions.

Cypress Semiconductor

Cypress Semiconductor

Cypress is a semiconductor design and manufacturing company providing embedded devices for secure IoT applications.

International School of IT Security (ISITS)

International School of IT Security (ISITS)

The International School of IT Security (ISITS) is a leading provider of professional training in the field of IT Security.

Egerie

Egerie

EGERIE's RiskManager solution provides a Global, Centralized, and Updated view of risk maps and security measures for your company.

Cyber Security & Information Systems Information Analysis Center (CSIAC)

Cyber Security & Information Systems Information Analysis Center (CSIAC)

CSIAC is chartered to leverage best practices and expertise from government, industry, and academia on cyber security and information technology.

Ethoca

Ethoca

Ethoca is a secure network for card issuers and merchants to connect and work cooperatively outside the payment network in a unique and powerful way.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ISMS.online

ISMS.online

ISMS.online is a cloud software solution for fast & cost-effective implementation of an information security management system and achieve compliance with ISO 27001 and other standards.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

Bloc Ventures

Bloc Ventures

Bloc Ventures is an investment company providing long-term, ‘patient’ equity capital to early stage unquoted deep technology companies.

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions to the alternative investment industry.

Hub71

Hub71

Hub71 is a world-class tech ecosystem opening doors to global opportunities from an optimal business environment for entrepreneurial-minded innovators.

Exium

Exium

At Exium we’ve integrated networking and security in a cloud-delivered Zero Trust platform powered by 5G and open source.

CyberTest

CyberTest

CyberTest offers cybersecurity consulting and penetration testing services that helps organizations and businesses securing their assets.

runZero

runZero

runZero delivers the most complete security visibility possible, providing you the ultimate foundation for successfully managing exposures and compliance.