News

2015-12-16

Can Big Data Help Climate Change?

The Earth is big and its climate is complicated. To understand it, scientists turn to big, complicated climate simulations that run on supercomputers.

2015-12-16

Encrypt A Message In the Big Bang Afterglow

If you’ve got a secret you need to keep safe, look toward the skies. Physicists propose using the afterglow of the big bang to make encryption keys.

2015-12-28

The True Cost of Surveillance

New legislation to regulate spying in the UK seeks to combine numerous existing powers and make them all subject to coherent oversight.

2015-12-15

Malware Mixed Into A Cyber Threat Cocktail

On The Rocks: Cybercrime group combines Pony, Angler and CryptoWall 4.0 in a single campaign slammer.

2015-12-15

Cyber Warfare: An Integral Part of Modern Politics

Cyber-operations are being used for a wide range of information warfare & intelligence gathering purposes, according to NATO.

2015-12-14

The Future Of Healthcare Systems Is ‘Unsexy Plumbing’

The technology companies that can get data integration right will be healthcare’s true change-makers.

2015-12-18

Age of Hackers Drops to 17

The UK National Crime Agency says the average age of suspected cyber-attackers has dropped dramatically to just 17.

2015-12-14

French Government Proposals To Block Tor and Forbid Free Wi-Fi

Le Monde reports two proposals for legislation, one around the state of emergency, and the other related to counterterrorism measures.

2015-12-22

Can You Solve The GCHQ Christmas Card Puzzle?

The British surveillance & intelligence agency GCHQ is sending out a Christmas card this year with a brain - teasing puzzle.

2015-12-18

Spies Want IBM’s Quantum Computer

One key area where quantum computers could have an impact is encryption and security.

2015-12-11

The Biggest Cybersecurity Risk Is Not Identity Theft

Hackers who deface websites, apps and other sources to spread false information present a very real threat.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North American Electric Reliability Corporation (NERC)

North American Electric Reliability Corporation (NERC)

NERC is a not-for-profit international regulatory authority whose mission is to assure the reliability and security of the bulk power system in North America.

Cyber Triage

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their network alerts.

Introspective Networks

Introspective Networks

Introspective Networks (IN) is a Cybersecurity company focusing on securing data in the network and automating knowledge work to decrease vulnerability points to critical infrastructure.

Modux

Modux

Modux focus on a number of core competencies across cyber security including; cyber intelligence & analytics, penetration testing and training.

GovCERT Austria

GovCERT Austria

GovCERT Austria is the Austrian Government Computer Emergency Response Team. Its constituency consists of Austria's public administration.

Slovenska Akreditacija (SA)

Slovenska Akreditacija (SA)

Slovenska Akreditacija (Slovenia Accreditation) is the national standards accreditation body for Slovenia.

SafeCipher

SafeCipher

At SafeCipher, we pride ourselves on being your single vendor-neutral resource for navigating the complexities of cryptographic data encryption.

Quantinuum

Quantinuum

Quantinuum is the combination of Cambridge Quantum with Honeywell Quantum Solutions, structured to drive the future of quantum computing.

Hong Kong Broadband Network (HKBN)

Hong Kong Broadband Network (HKBN)

HKBN are a leading integrated telecom and technology solutions provider that offers a comprehensive range of premier ICT services to both the enterprise and residential markets.

Contechnet Deutschland

Contechnet Deutschland

Contechnet Deutschland started as a specialist in the area of IT disaster recovery and has since broadened its portfolio into information security and data protection.

World Cyber Security Summit

World Cyber Security Summit

World Cyber Security Summit, by Trescon, is a thought-leadership driven platform for CISOs who are looking to explore new-age threats and the technologies/strategies that can help mitigate them.

DataSixth Security Consulting

DataSixth Security Consulting

DataSixth delivers Cybersecurity Intelligence. With our unique capabilities, we’re able to deliver value, deliver answers, and deliver actionable security intelligence.

Panther Labs

Panther Labs

Panther’s mission is to make security monitoring fast, flexible and scalable for all security teams.

Valeo Networks

Valeo Networks

Valeo Networks is a full-service Managed Security Service Provider (MSSP). We partner with organizations to remove the burden of technology so that they can focus on growing their business.

Transatlantic Cyber Security Business Network

Transatlantic Cyber Security Business Network

The Transatlantic Cyber Security Business Network is a coalition of UK and US cyber security companies which facilitates collaboration to help address critical cyber security challenges.

FusionAuth

FusionAuth

FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome.