News

2016-10-07

Secret Arrest Of A National Security Agency Contractor

FBI agents investigate theft and disclosure of highly classified NSA computer code developed to hack into the networks of foreign governments.

2016-10-06

Yahoo Secretly Scanned Emails For US Intelligence

Last year Yahoo secretly built a custom software program to search all incoming emails for specific information provided by US intelligence agents.

2016-10-05

Something To Hide? Apple Will Share Your iMessages With The Police

Apple promises that your iMessage conversations are safe and out of reach from anyone other than you and your friends. Really?

2016-10-12

Cyber Attacks Do More Damage Than Physical Attacks

Previous Head the US Dept. of Homeland Security thinks that digital attacks are now more dangerous & damaging than physical attacks.

2016-10-12

AI Is Replacing Human Made Decisions In The US Military

A new survey of existing weapon systems finds that AI is increasingly used to replace humans, not just helping them.

2016-10-10

UK Cyber Highway Will Improve Security

The proposed UK Cyber Highway will give organizations the power to take control online of the Cyber Essentials certification process.

2016-10-13

A New Front In The Business Of Political Espionage

The days of spies trying to get their hands on state and trade secrets are still alive and well today. Except, now they’re digital.

2016-10-11

Lawyers Beware: A Robot Will Take Your Job

Well-tuned search engines could save junior legal professionals a lot of time and suffering. But where does human intelligence come in?

2016-10-05

The Dilemma Of Predictive Policing

How Police authorities respond to information gathered using computer modelling is at least as important as the predictions themselves.

2016-10-14

The Self-Fulfilling Prophecy Of Intelligent Automation

Intelligent automation is going through a rapid democratisation and should no longer be seen as a nightmare of unpredictable, threatening robots.

2016-10-10

How Easy Would It Be To Hack Your Business?

The most important thing any firm can do to protect itself from hacks – both visual and cyber – is to change the way it thinks.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CLUSIL

CLUSIL

CLUSIL is an association for the information security industry in Luxembourg.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

GuardiCore

GuardiCore

GuardiCore is an innovator in internal data center security and breach detection and is transforming security inside data centers and clouds.

SySS

SySS

SySS is a market leader in penetration testing in Germany and Europe.

CyberGhost

CyberGhost

CyberGhost is a Virtual Private Network services provider offering secure encrypted access to the internet.

Verafin

Verafin

Verafin is one of the North American leaders in fraud detection and AML software.

Crashtest Security

Crashtest Security

Crashtest Security is a cyber security company that helps digital companies to continuously create secure software with the help of automated vulnerability assessments.

NinjaJobs

NinjaJobs

NinjaJobs is a community-run job platform developed by information security professionals. We focusing strictly on cybersecurity positions.

Jandnet Recruitment

Jandnet Recruitment

Jandnet Recruitment is a small specialist company working in the IT sector. We recruit across all IT disciplines including cyber security and digital identity.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

Uptycs

Uptycs

Uptycs combines the open source universal agent, osquery, with a scalable security analytics platform for fleet visibility, intrusion detection, vulnerability monitoring and compliance.

Sixteenth Air Force (Air Forces Cyber)

Sixteenth Air Force (Air Forces Cyber)

Air Forces Cyber provides mission integration of Information Warfare at operational and tactical levels, creating dilemmas for adversaries in competition and, if necessary, future conflicts.

Venustech

Venustech

Venustech is a leading provider of network security products, trusted security management platforms, specialized security services and solutions.

BSS

BSS

BSS is a solutions and services business based in the UK with a focus on Cyber Security, Data, Financial Crime, Internal Audit, Change, Risk and Resilience.

Cytracom

Cytracom

Cytracom delivers powerful yet intuitive solutions that enable MSPs and ITSPs to meet the challenges of security, compliance, and connectivity.

Koop

Koop

Koop’s trust management platform helps navigate the complexities of regulatory compliance, security reviews, and liability insurance in a single place.