News

2018-05-16

Getting The Most From Investing In AI

Artificial Intelligence is forcing companies to apply a business strategy that combines intelligent technologies and human talent to reach customers.

2018-05-16

Why Are So Few Women In Cybersecurity?

Males hold three out of four jobs in the tech world, but it is in cybersecurity where the lack of participation of women is most acute.

2018-05-15

Blockchain Is Transforming The Investment Business

Until recently, investors hardly knew what blockchain & crypto-currencies were. Now, blockchain is transforming finance & investing.

2018-05-15

Seminar: Next Steps For Cyber Security In The UK

London Thursday, 12th July. A timely opportunity to discuss key issues surrounding cyber security in the UK. CPD Certified.

2018-05-15

First GDPR. Now A New EU Cyber Regulation

The Network & Information Security (NIS) regulation is aimed at creating a base level of security for essential services within the EU.

2018-05-14

Real-Time AI Gets Close To A Brainwave

Microsoft Azure's Cloud Service introduces 'Project Brainwave' a hardware architecture designed to accelerate real-time AI calculations.

2018-05-14

Russian Hackers Try To Penetrate The Sun

Gotcha: A leading British newspaper has been targeted as new warnings about Russian sponsored hackers are issued by the NCSC .

2018-05-14

Artificial Intelligence Will Reshape Banking

As many as 70% of front-office jobs in the banking industry will be dislocated by AI and the required skills will be in technology, not finance.

2018-05-14

Canadian Tech Used To Censor The Internet

A little known Canadian business is behind a widespread technology used to filter access to the worldwide web in certain countries.

2018-05-14

Cyberattacks Focus On Big UK Charities

Charities are highly exposed to online risks: Seven in ten large UK charities have experienced cybersecurity breaches in the last 12 months.

2018-05-14

Three Ways That Automation & Machine Learning Are Changing Data Centres

Introducing self-managing data centers, where automation and machine learning handle administrative storage tasks.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

SGCyberSecurity

SGCyberSecurity

SGCyberSecurity is Singapore's No.1 Cyber Security portal. From this platform, you will be able to find useful articles, resources and connect with the security companies for your business needs.

Averon

Averon

Averon's technology is the new gold standard for digital identity - the easiest, fastest and most secure verification solution for users on both WiFi and LTE.

ThreatAware

ThreatAware

Total visibility of your business cybersecurity. Monitoring, management and compliance for your cybersecurity tools, people and processes from one easy to use dashboard.

Digi International

Digi International

Digi is a leading global provider of mission-critical and business-critical machine-to-machine (M2M) and Internet of Things (IoT) connectivity products and services.

doIT Solutions

doIT Solutions

doIT solutions specialize in IT security and infrastructure, security automation, data center, and cybersecurity.

SafeStack Academy

SafeStack Academy

SafeStack Academy is an online cyber security and privacy education platform. Our content is designed by experts to suit small businesses, growing companies, and development teams.

Syracom

Syracom

syracom is a consultancy firm specialized in development of efficient business processes. With our expertise and IT competence, we develop tailored solutions for customers in various industries.

Ermetic

Ermetic

Ermetic’s identity-first cloud infrastructure security platform provides holistic, multi-cloud protection in an easy-to-deploy SaaS solution.

SOC Prime

SOC Prime

SOC Prime is the only Threat Detection Marketplace where researchers monetize their content to help security teams defend against attacks easier, faster and more efficiently than ever.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

Knownsec

Knownsec

Knownsec provides customers with cloud defense, cloud monitoring, and cloud mapping products and services with "AI + security big data" as the underlying capability.

Beacon Technology

Beacon Technology

Beacon Technology offers a comprehensive platform consisting of XDR, VMDR, and Breach and Attack simulation tools.

Silence Laboratories

Silence Laboratories

Silence Laboratories is a cybersecurity company that focuses on the fusion of cryptography, sensing, and design to support a seamless authentication experience.

Secher Security

Secher Security

Secher Security is a professional and secure partner with a high level of professional expertise in simplifying and optimizing complex IT infrastructures.