News

2016-11-28

Misinformation & Cyber Attacks During Montenegro Elections

Possible vectors for a foreign power to influence elections in an EU membership candidate country.

2016-11-28

Google Technology To Treat UK Health Service Patients

London's Royal Free NHS hospital trust has teamed up with Google to share patient data using Deep Mind computing power.

2016-11-28

Has Cognitive Computing Arrived?

Cognitive computing has the potential to transform the way we view data analytics.

2016-11-28

Facebook Will Double UK Employees

Facebook will expand its presence in the UK by 50% when it opens its new London headquarters in 2017, the US technology giant has announced.

2016-11-25

The British IP Bill & Protection From Government Snoopers

The UK Investigatory Powers Act, aka 'the snoopers charter' passes in to law in December. It basically removes your right to online privacy.

2016-11-22

Google & Facebook Ban Fake News Sites

It's too late now: Google and Facebook are taking steps to control fake news by closing down access to their advertising networks.

2016-11-22

Spies Use Tinder

Surveillance and infiltration are not new tactics and collecting data from social media shows how the internet is bringing it all to a whole new level.

2016-11-22

Three Step Pogram: Pre-Breach Remedies To Contain The Costs Of A Cyber Attack

Data breaches are very costly. Organisations should consider three basic steps to ensure they are prepared to remedy a future breach.

2016-11-21

Social Media & The New Advertising Model (£)

Too Big To Ignore: Engaging with social media is now crucially important for all businesses that want to connect with the new audience.

2016-11-21

Cultural Strategies For Data Security (£)

Information security is a complicated and often difficult subject for business leaders to understand. Here are some coping methods.

2016-11-21

Information Analysis Is The New Revolution (£)

Every industry has to deal with AI powered Information Analysis which is a significant aspect of the new technology revolution.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

Cyber Security Agency of Singapore (CSA)

Cyber Security Agency of Singapore (CSA)

The CSA is the national agency overseeing cybersecurity strategy, operation, education, outreach, and ecosystem development.

Exostar

Exostar

Exostar is the cloud platform of choice for secure enterprise and supply chain collaboration solutions and identity and access management expertise.

Crashtest Security

Crashtest Security

Crashtest Security is a cyber security company that helps digital companies to continuously create secure software with the help of automated vulnerability assessments.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

Tech-Recycle

Tech-Recycle

Tech-Recycle was formed to help companies and individuals securely, ethically and easily recycle their IT and office equipment. We destroy all data passed to us safely and securely.

drie

drie

drie is an end-to-end cloud services company based in Bahrain, Dubai and London. We enable businesses to adopt, scale on and build for cloud.

Ethyca

Ethyca

Ethyca builds automated data privacy infrastructure and tools for developers and privacy teams to easily build products that comply with GDPR, CCPA Privacy Regulations.

CYMOTIVE Technologies

CYMOTIVE Technologies

Combining Israeli cyber innovation with a century of German automotive engineering. CYMOTIVE operates under the assumption that connectivity is a game changer for the automotive industry.

DoQubiz Technology

DoQubiz Technology

DoQubiz is using the idea of security through obscurity to develop their proprietary Fractal Security Engine that implements a highly resilient data protection protocol.

NACVIEW

NACVIEW

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections.

Protexxa

Protexxa

Protexxa is a B2B SaaS cybersecurity platform that leverages Artificial Intelligence to rapidly identify, evaluate, predict, and resolve cyber issues for employees.

Custodia Continuity

Custodia Continuity

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.

Andesite

Andesite

Andesite is delivering sustained advantage to cyber defense teams through technology and community.