News

2016-08-31

Edward Snowden Proposes Smartphone Privacy

Russia-based privacy advocate Edward Snowden has proposed a device that will inform users when their phones are disclosing their location.

2016-08-31

Psychological Warfare On Social Media

Twittersphere: Cyberwar between India and Kashmiri insurgents is hotting up with a big PsyOps element, focused on social media.

2016-08-30

Enabling Computer Super Intelligence

ARM is designing a semiconductor chip on which the number of transistors is projected to exceed the number of cells in a human brain.

2016-08-30

US Police Use Pokémon Go To Lure Criminals

There can’t be any doubts now of Pokémon Go’s world domination – even the police are getting in on the action.

2016-08-30

Businesses Need To Protect Data, Not Just Devices

Companies are moving away from platform-specific endpoint security technologies toward securing their applications & data everywhere.

2016-08-30

Over 50% Data Breaches Are Due To Human Error

Cyber-fraud is malicious while a breach caused by user ignorance is not.Their organisational consequence can be equally severe.

2016-08-29

London Police Chief Says Spy Agencies Face Terror Fight

London’s Police Chief says international security agencies can not prevent the type of terrorist attacks that have occurred in France & Germany.

2016-08-29

The Hidden Costs Of A Data Breach

Strengthening defenses against cyber-attackers is important. Companies must also prepare for reputational & financial damage lasting for years.

2016-08-29

Cyber War In Kashmir

An historic dispute over sovereignty in Kashmir is hotting and there is a growing cyber dimension.

2016-08-26

Artificial Intelligence Has Finally Emerged Into Real Life

Robotics is about embedding rules into a technological process. AI is about embedding analytics into the process.

2016-08-26

Where In The World Do The Cyber Villains Live?

Hackers work all around the world, but what's particularly surprising is how much the style of an attack depends on where it comes from.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IX Associates

IX Associates

IX Associates is a UK based IT Integration business specialising in risk, compliance, eDefence, and network security solutions.

Verimuchme

Verimuchme

Verimuchme is a digital wallet and exchange platform to secure, verify and re-use personal information.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

Sangfor Technologies

Sangfor Technologies

Sangfor is a global leader of IT infrastructure, security solutions, and cloud computing.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

Lexsynergy

Lexsynergy

Lexsynergy is a global domain name management and online brand protection company.

CHEQ

CHEQ

CHEQ provides fully autonomous, preemptive technology for brand safety and ad-fraud prevention.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

Wayra

Wayra

Wayra connects Telefónica and technological disruptors around the world. As their preferred strategic partner, we scale them up to accelerate their business and ours.

CleanCloud by SEK

CleanCloud by SEK

CleanCloud by SEK is a CSPM product focused on public cloud data protection and security regulations, with over 400 compliance checks for the market's leading frameworks and regulations.

3i Infotech

3i Infotech

3i Infotech offers consulting & professional services to assess, design and build next gen IT infrastructure, and managed services to operate, optimize and continuously improve.

Picnic

Picnic

Picnic is a gritty, pioneering team of intelligence and cybersecurity specialists focused on solving the security challenge of our time - social engineering.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

ASRC Federal

ASRC Federal

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance.

Anthropic

Anthropic

Anthropic is a Public Benefit Corporation, whose purpose is the responsible development and maintenance of advanced AI for the long-term benefit of humanity.