News

2016-03-23

NSA Using The Cloud To Thwart The Next Snowden

In a post-Snowden world, is it really a good idea to have analysts swimming around in one vast ocean of NSA secrets and data?

2016-03-25

Why Executives Need to Prioritise Cybersecurity

Despite the warnings of Sony, Anthem and many others, business executives still aren’t prioritising cybersecurity as a top business concern.

2016-03-28

Big Data: The 4 Layers Everyone Must Know

There are four different stages that data has to pass through from a raw unstructured datum to becoming an actionable insight.

2016-03-28

Cybersecurity Training, Military Style

Cybersecurity-training programs modeled on military tactics are making their way to the private sector.

2016-03-22

North Korea Denies Cyber Attacks On South Korea

North Korea denies it conducted cyber attacks against officials from rival South Korea, calling the South's accusation that it did so a "fabrication".

2016-03-25

Obama Says Apple's Technology Can't Be Inaccessible To The State

President Barack Obama recently said, that smartphones must not be allowed to be "black boxes," inaccessible to the government.

2016-03-23

Former CIA Director Calls Out The FBI Over iPhone Backdoor

The FBI’s demand that Apple create a custom version of iOS that would allow them to hack an iPhone has Americans divided into two camps.

2016-03-23

Is Apple Right To Resist The FBI?

The FBI wants Apple to do something no private company has ever been forced to do: break its own technology.

2016-03-23

China Wants FBI’s Help With Internet Security

China wants to have deeper Internet security, anti-terrorism and corruption cooperation with the United States.

2016-03-23

U-Upload : Knowledge Straight To Your Brain

Researchers from HRL Laboratories say they have found a way to manipulate the brain to greatly amplify learning.

2016-03-23

The Future Of Big Data – Some Predictions

Almost everyone can agree that big data has taken the business world by storm, but what’s next?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

Verlingue

Verlingue

Verlingue (formerly ICB Group) is a leading corporate insurance broker providing Insurance, Risk Management and related advice to businesses and private clients.

CyberPoint

CyberPoint

CyberPoint delivers innovative, leading-edge cyber security products, solutions, and services to customers worldwide.

Netrix

Netrix

Netrix is a Mexican company specialized in IT Security, with more than 18 years of experience in Managed Services, Professional Services and Turnkey Solutions related to Security.

Calero Software

Calero Software

Calero is a leading global provider of Communications and Cloud Lifecycle Management (CLM) solutions designed to simplify the management of voice, mobile and other unified communications services.

Cyber Security Jobs

Cyber Security Jobs

Cyber Security Jobs was formed to help job seekers find jobs and recruiters fill cyber security job vacancies.

DataEndure

DataEndure

DataEndure helps companies build digital resilience so that their critical information assets are protected and available to the right people, at the right time.

TAV Technologies

TAV Technologies

TAV Technologies is a provider of technology services to the aviation industry in areas including airport infrastructure systems, digital transformation and cybersecurity.

Incognia

Incognia

Incognia have created a ubiquitous private identity based on location behavior, that enables a personalized frictionless experience with mobile apps and connected devices.

Balance Theory

Balance Theory

Balance Theory provides the knowledge infrastructure and collaboration center for the cybersecurity community. A networked community to build better cybersecurity outcomes.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.

ResilientX

ResilientX

ResilientX is an All-In-One Security Testing Platform designed to help MSPs and SMBs to perform their security testing and assessments without having to outsource IT.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.

Thero6

Thero6

Thero6 develop dynamic financial analysis algorithms that help prevent coin collapses and theft of cryptocurrency funds by identifying the transaction absolutely throughout the chain.

Nicos AG

Nicos AG

Nicos AG specializes in secure, global data communication.