News

2017-04-11

AI Art - Electronic Rembrandt Creation

Dutch Master: Replicating Rembrandt's artistic techniques to re-create a famous masterpiece using software and a 3-D Printer.

2017-04-05

The Cusp Of Merging Human With Machine

We are at the point where computers and machines are no longer going to be simply tools. Computers are becoming, literally, part of us.

2017-02-21

Hackers targeted Banks and 100 organisations

Malware attacks that recently put the Polish banking sector on alert were part of a larger campaign that targeted financial organisations from more than 30 countries.

2017-04-01

Make The Most Of Data Analytics

Top Tips for HR on improving workforce diversity using Data Anayltics.

2017-02-21

Russian Hackers using new Viruses for Attacks

State-sponsored Russian hackers are using a new type of virus designed to attack critical Ukrainian infrastructure such as the power grid and financial system, a senior Ukrainian state security official said recently.

2017-02-21

Guide To The Internet of Things

You’ve likely heard the phrase Internet of Things, or IoT, at some point if you have been following any tech news in the last several years.

2017-03-28

Hamas Upgrades Cyber Espionage Capability

Non-state political groups like Hamas have developed state-like hacking, espionage and surveillance capabilities.

2017-02-21

Italy's Foreign Ministry under Cyber Attack

Italy's foreign ministry was hacked last year, a source close to the department said recently, confirming a report in the Guardian newspaper which also said Russia was suspected of perpetrating the attack.

2017-02-21

Wikipedia's editors cut out the Daily Mail

News that a few dozen Wikipedia editors had decided that the Daily Mail should be “generally prohibited” from being used as a source caused consternation among many in the media.

2017-03-24

Stealthy Malware Is Going Mainstream

Fileless malware avoids detection by hiding its payload in secluded spots, like a computer’s RAM or kernel, independent of hard drive files to run on.

2017-03-27

Data Breaches Attack All Parts Of A Business

Be Prepared: Data breaches are an enterprise wide problem involving top managers, legal counsel, HR, PR & other business stakeholders.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Axial

Axial

Axial Systems is one of the UK’s leading solution providers and systems integrators in network, security and services.

MyCERT

MyCERT

MyCERT is the National Computer Emergency Response Team of Malaysia.

Advanced Software Products Group (ASPG)

Advanced Software Products Group (ASPG)

ASPG offers a wide range of innovative mainframe software solutions for Data Security, Access Management, System Management and CICS productivity.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

National Accreditation Authority Hungary (NAH)

National Accreditation Authority Hungary (NAH)

NAH is the national accreditation body for Hungary. The directory of members provides details of organisations offering certification services for ISO 27001.

Open Connectivity Foundation (OCF)

Open Connectivity Foundation (OCF)

OCF is dedicated to ensuring secure interoperability ensuring secure interoperability of IoT for consumers, businesses and industries.

Genius Guard

Genius Guard

Genius Guard specializes in DDoS Protection, DDoS Protected Webhosting, HYIP Hosting, Bitcoin Hosting, Cryptocurrency Hosting.

Breadcrumb Cybersecurity

Breadcrumb Cybersecurity

Breadcrumb Cybersecurity is a cybersecurity and advisory firm. We specialize in penetration testing, threat hunting, incident response, regulatory compliance, and employee training services.

Cranfield University

Cranfield University

Cranfield Defence and Security are at the forefront of their fields, offering capabilities ranging from cyber security and digital warfare to robotics, forensic sciences and simulation and analytics.

West Midlands Cyber Resilience Centre (WMCRC)

West Midlands Cyber Resilience Centre (WMCRC)

The East Midlands Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

OneLayer

OneLayer

OneLayer provide enterprise grade security dedicated for private LTE/5G networks. We ensure that the best IoT security toolkit is implemented in your cellular environment.

Sure Valley Ventures

Sure Valley Ventures

Sure Valley Ventures is an entrepreneur led venture capital fund focused on helping software entrepreneurs grow and scale businesses that will have a global impact.

Stryve

Stryve

Stryve is a leading carbon-neutral provider of specialist cloud and cybersecurity services in Europe.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

Maintel

Maintel

Maintel provides cloud and managed communications services. We help our customers to deliver exceptional customer experiences, and to securely access their applications and their data.

CUBE3 AI

CUBE3 AI

CUBE3.AI is a web3 security platform that provides real-time transaction protection for smart contracts, safeguarding against cyber exploits, fraud, and compliance risks.