News

2016-03-22

AI Is Closer Than We Know…

Recent advances in technology make AI even closer to reality than most of us imagine.

2016-03-21

The Vocabularist: How We Use The Word ‘Cyber’

The prefix "cyber-" now denotes words to do with the Internet, although it has followed an eventful path to reach its modern meaning.

2016-03-21

Google's AI Wins Final Go Challenge

Google's DeepMind artificial intelligence has secured its fourth win over a master player, in the final of a five-match challenge.

2016-03-23

Ukraine Blackout – The Future Of War

To see how cyber will play into armed conflict, look no further than the attacks on the Ukrainian energy sector.

2016-03-21

Now Surveillance 'aggressive-invasive': Snowden

Edward Snowden, known for revealing the extent of surveillance by US intelligence, says it is "more aggressive and invasive today than it was before".

2016-06-24

'Brexit' Could Put Data Sharing in Jeopardy

A vote to leave and the passing of the IP Bill could see a ban on the transfer of data between the UK and EU. Opinion by Emily Taylor

2016-03-14

Directors & Senior Management Cyber Report (£)

Business need more electronic security, thoughtful analysis and consideration given to potential commercial risk & opportunities than ever.

2016-03-14

Data Analysis & CRM For 2016 (£)

Data Analysis & CRM For 2016

2016-03-14

A Brief Explanation Of Malware (£)

A Brief Explanation Of Malware

2016-03-14

PR & Press After An Attack (£)

PR & Press After An Attack

2016-03-14

Six Things Every Board Member Should Know About Cyber Security (£)

Commercial Security and Cyber Security are no longer just IT problems - they are Business Critical (premium subscribers)

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

AA Certification (AAC)

AA Certification (AAC)

AAC provide ISO Quality Management System certification services including ISO 27001.

CERT Syria

CERT Syria

CERT Syria is the national Computer Emergency Response Team for Syria.

Wipe-Global

Wipe-Global

Wipe-Global is specialized in data erasure with an international established service partner network.

Octane OC

Octane OC

OCTANe is building the SoCal of tomorrow. We drive innovation and growth by connecting people, resources and capital. Our Incubator focus is FinTech, Data Analytics and Cybersecurity.

Digital Magics

Digital Magics

Digital Magics is an incubator for innovative startups which offer content and services with high technological value. Areas of focus include IoT, Enterprise Software, AI, Industry 4.0 and Blockchain.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

Soteria

Soteria

Soteria is a global leader in the development, integration and implementation of advanced cyber security, intelligence and IT solutions, delivering complete end-to-end solutions.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

Exterro

Exterro

Exterro is a leading provider of e-discovery and information governance software specifically designed for in-house legal, privacy and IT teams at Global 2000 and Am Law 200 organizations.

Valtix

Valtix

Valtix is the first and only multi-cloud network security platform delivered as a service that enables cloud teams to meet the most stringent security requirements in a cloud-first & simple way.

CodeLock

CodeLock

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics.

ProArch

ProArch

ProArch is a global team of multidisciplinary experts in cloud, infrastructure, data analytics, cybersecurity, compliance, and software development.

Atlas Cloud

Atlas Cloud

Atlas Cloud is a UK-wide provider of managed services based in Newcastle. Our ‘research-led’ approach to IT services helps leaders make better decisions about IT for their businesses.

Cybermindz

Cybermindz

Many cyber security professionals are under sustained and increasing stress. We set about providing direct support to restore and rebuild emotional and cognitive health.

Black Bison Cyber

Black Bison Cyber

Black Bison Cyber is a premier cybersecurity firm specializing in elite, discreet, and highly personalized digital protection for high-profile individuals and executives.