News

2016-03-11

Japan's Critical Infrastructure Under Cyberattack

Waves of cyber attacks against key industries across Japan, S. Korea, the United States, Europe and other Southeast Asian countries. But where from?

2016-03-11

3D Printing: The Next Industrial Revolution

3D printing could disrupt mass-production as we know it. Could we possibly be on the verge of replacing mass production altogether?

2016-03-11

World’s First Wearable Translator

Our most primal myths warn us of the risks of disjointed communications. This is about to change.

2016-03-09

Open Source Intelligence: Special Ops In Syria Exposed

An unparalleled level of transparency accessible at the click of a mouse is exposing the deployment of military assets.

2016-03-09

Dark Territory: The Secret History of Cyber War

Fred Kaplan's Secret History of Cyberwar: When it comes to the questions of conflict in the digital age, “we’re wandering in dark territory.”

2016-03-11

UK: Twitter To Train Prosecutors To Fight Online Abuse

The Internet is increasingly used as a weapon by perpetrators of domestic abuse, rape and sexual violence against women.

2016-03-08

Many Organisations Are Too Lax About Mobile Data Threats

Mobile devices can be a critical part of any cyber attack and mobile data breaches are more common than you might think.

2016-03-08

US Military Are Doubling Down On Robot Wars

The US military are investing heavily in a new generation of unmanned, autonomous weapons.

2016-03-07

Canada Cuts 5 Eye Intelligence Sharing

Canada slams on the brakes on sharing some communications intelligence out of fear that Canadians' personal information is unprotected.

2016-03-09

Reduce Risk With Threat Intelligence

Do you want to be more proactive in managing risk? What is the risk if you don’t pay attention to knowledge learned from previous events?

2016-03-07

Apple v FBI: The US Debates Privacy

Is there such a thing as security that is so good that it's a danger to society?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

Grimm Cyber

Grimm Cyber

GRIMM makes the world a more secure place by increasing the cyber resiliency of our client’s systems, networks, and products.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

BrainChip

BrainChip

BrainChip is the leading provider of neuromorphic computing solutions, a type of artificial intelligence that is inspired by the biology of the human neuron - spiking neural networks.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

RIA in a Box

RIA in a Box

MyRIACompliance combines our team of RIA compliance experts with an online software platform to help investment advisers better manage regulatory compliance and cybersecurity responsibilities.

VirtualArmour

VirtualArmour

VirtualArmour is a managed security services provider with global reach and local attitude.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

Custard Technical Services

Custard Technical Services

Custard provide Network Security for all types of businesses across many industries, helping to keep them safe and secure.

Battery Ventures

Battery Ventures

Battery partners with talented founders and teams building category-defining businesses at all stages of growth.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

Rampart AI

Rampart AI

Tackling DevSecOps Issues In Application Security. Rampart has revolutionized the shift left security approach, applying zero-trust to application development.

CRYPTIQ

CRYPTIQ

CRYPTIQ empowers businesses to navigate the ever-evolving cybersecurity landscape with confidence and clarity.

Point3 Security

Point3 Security

Point3 Security is a premier information security organization that provides the industry with the talent screening and analytical tools to enhance its workforce.