News

2018-02-21

AI In Conflict: Cyberwar & Robot Soldiers

Munich Security Conference: The use of robots and artificial intelligence within the military sphere might make the whole world more unstable.

2018-02-21

Chinese Police Wearing Face Recognition Glasses

Chinese police are now wearing sunglasses equipped with facial-recognition technology connected to a database of criminal suspects.

2018-02-20

Crypto-Mining Is A Growing Epidemic

Cryptocurrency mining presents a real threat to businesses, with nearly 25% of organisations worldwide affected by Coinhive malware.

2018-02-20

A Search Tool That Allows Anyone To Access Cloud Documents

Buckhacker is a hacking tool that trawls unsecured cloud server platforms. Companies using them are at risk of losing control of their data.

2018-02-20

Discover Your Inner Spy

Spyscape: New York has a new museum, designed by a British intelligence officer, giving visitors a taste of life as a secret agent.

2018-02-19

What Do CISOs Prioritise To Improve Cybersecurity?

As security has increasingly become a concern for financial institutions, the role of the CISO has been thrust into the organisational spotlight.

2018-02-19

What Does The US Air Force Want From AI?

Amongst other things, the answer is the capability to shoot someone in the face from 200 Kilometers away.

2018-02-19

Facebook Personal Data Use & Privacy Settings Ruled Illegal

German court rules that Facebook collects and uses personal data without providing enough information to users for them to give meaningful consent.

2018-02-19

Bitcoin Energy Use In Iceland Soars

Making Money: Electricity use at Bitcoin mining data centres located in Iceland is likely to exceed the energy consumption of all the nation's homes.

2018-02-19

UK Blames Russia For NotPetya Cyberattack

UK Defence Minister accuses the Russian government of “undermining democracy” with a cyberattack targeting Ukraine and spread across Europe.

2018-02-16

Facebook Enables 'Fake News'

Digital Deceit: More people are coming to the conclusion that social networking is an overall negative for society.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Nmap Project

Nmap Project

Nmap Project is a Free and open source tool for network discovery, administration, and security auditing.

Cyber Security Network

Cyber Security Network

Cyber Security Network provide specialist cyber security recruitment services.

Japan Network Security Association (JNSA)

Japan Network Security Association (JNSA)

JNSA's goal is to promote standardization related to network security and to contribute to greater technological standards in the field.

RHEA Group

RHEA Group

RHEA Group offers aerospace and security engineering services and solutions, system development, and technologies including cyber security.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

CyberSec Hub - The Kosciuszko Institute

CyberSec Hub - The Kosciuszko Institute

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

Crosspring

Crosspring

Crosspring is an incubator/accelerator for people who have the ambition to start a successful business or want to extend their existing business in the areas of FinTech, AR, VR, Cybersecurity and SaaS

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group, Ltd. (STIGroup) is an innovative firm that provides CyberSecurity consulting, secure IT engineering, managed security services, and human capital solutions.

VIRTIS

VIRTIS

VIRTIS' mission is to provide today's leading organizations peace of mind that their entire digital network perimeter is safe from hackers and data breach.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

Software Improvement Group (SIG)

Software Improvement Group (SIG)

Software Improvement Group helps business and technology leaders drive their organizational objectives by fundamentally improving the health and security of their software applications.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

PagerDuty

PagerDuty

PagerDuty is the central nervous system for a company’s digital operations. We identify issues in real-time and bring together the right people to respond to problems faster.

Gorilla Technology Group

Gorilla Technology Group

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes.

Parablu

Parablu

Parablu is a leading provider of data security and resiliency solutions for the digital enterprise.

Fivecast

Fivecast

Fivecast is enabling a safer world. We help organizations around the world explore masses of data to uncover actionable insights.