News

2016-05-31

Google Implements Neural Network Computing For Machine Learning

Google’s SyntaxNet is an open-source neural network framework that provides a foundation for Natural Language Understanding systems.

2016-05-31

Companies Should Share Cyberattack Information

Disclosure of data breaches might help strengthen cybersecurity for everyone.

2016-05-31

Iraq Shuts Internet During School Hours

Drastic Measures: Iraq has been turning off the internet across the country to stop children cheating in exams.

2016-05-31

Pentagon Testing Small Robot To Hunt Naval Mines

The US military has been looking for an underwater bomb disposal robot for years. It finally has one.

2016-05-30

Edward Snowden JoinsWith Jean Michel Jarre To Make Music About Cybersecurity

To see music and politics mix isn’t much of a rare occurrence.

2016-05-28

How ISIS Uses The Internet

Malware, messaging and more:The world’s major intelligence agencies are trying to figure out just how ISIS uses the internet.

2016-05-26

US Must Prepare For Cyber Warfare In Space

The developing stage for warfare is in cyberspace, but the next stage could well grow in a familiar frontier, space.

2016-06-04

Open Access To The Snowden Archive

Emulating the Panama Papers Archive, The Intercept Magazine are opening up access to the secret documents Edward Snowden took from the NSA.

2016-05-26

Both US Presidential Campaigns Hacked

Hackers working for foreign governments are targeting the main candidates in this year's presidential election.

2016-05-26

March Of The Machines

The world stands on the brink of a 4th industrial revolution, not just about manufacturing or automation but transforming services & professions.

2016-05-25

Cyberwar: The Smart Person's Guide

Cyberwarfare is real. Governments are spending £billions making sure they can fight battles on the internet & you might get caught in the crossfire.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

National Institute of Standards & Technology (NIST) - USA

National Institute of Standards & Technology (NIST) - USA

NIST is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Areas covered include IT and cybersecurity.

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

TruSTAR Technology

TruSTAR Technology

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

C5 Capital

C5 Capital

C5 Capital is a specialist investment firm that exclusively invests in the secure data ecosystem including cybersecurity, cloud infrastructure, data analytics and space.

RIT Global Cybersecurity Institute

RIT Global Cybersecurity Institute

At RIT's Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

Sevatec

Sevatec

Sevatec’s Active Cyber Defense (ACD) methodology proactively defends against adversarial kills chain, addressing active and emerging threats while reducing program vulnerabilities and risks.

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute builds on the strength of its members in the area of network and communication security, artificial intelligence, big data and cyber physical systems.

Identity Management Institute (IMI)

Identity Management Institute (IMI)

Identity Management Institute (IMI) provides professional training and certification in cyber security with a focus on identity and access management, identity theft, and data protection.

Persona

Persona

At Persona, we’re humanizing online identity by helping companies verify that their users are who they say they are.

inSOC

inSOC

inSOC is an enterprise-grade AI-driven SOCaaS solution detecting breaches 24/7 with vulnerability management built-in. Designed for MSPs and MSSPs.

Reco AI

Reco AI

Reco is an identity-centric SaaS security solution that empowers organizations with full visibility into every app, identity, and their actions to control risk in their SaaS ecosystem.

Relyance AI

Relyance AI

Relyance AI - One unified platform for privacy, security, & governance.

Pango

Pango

Pango is a leading provider of digital consumer security solutions.

Qodea

Qodea

Qodea (formerly Appsbroker CTS) is Europe's largest Google Premier only transformation partner.

Creative Network Innovations (CNI)

Creative Network Innovations (CNI)

Creative Network Innovations is a leader in providing advanced IT and cybersecurity solutions.