News

2015-10-06

AI - Reshaping the Workplace

AI-powered business applications will automate jobs, rather than just a task and the the effects will ripple across organizations.

2015-10-06

Russian Scientists Create Cockroach Robo-Spy

RoboRoach: Biologically inspired engineering to create an artificial organism which can be operated using a mobile app.

2015-10-06

Medical Devices Vulnerable to Hackers

Thousands of critical medical systems, such as MRI machines, are available for hackers to access online.

2015-10-07

Cyber Attacks Cost Business Over $300bn Worldwide Last Year

Research from Grant Thornton reveals that cyber attacks are taking a serious toll on business.

2015-10-05

Why Is China Hacking Norway?

Half of all cyber intrusions in the Nordic states target Norwegian companies and Norway seems to be the main target of Chinese hackers.

2015-10-05

India Discusses Cyber 9/11 Prevention

India is worried that it's Banking, IT & Service sectors are vulnerable to the threat of serious cyber attacks.

2015-10-02

U.S & China Talk Truce But Cyber War Remains

James Clapper, Director of National Intelligence, tells U.S Senate hearing on cybersecurity that he is not optimistic about the agreement.

2015-10-05

Integrating Video Analytics Technologies At Airports.

There is a critical need for finding solutions for more advanced security in airports.

2015-10-02

Karma Police: From Radio to Porn, British Spies Track Web Users’ Online Identities

There was a simple aim at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.”

2015-10-02

Edward Snowden Joins Twitter & Follows NSA

His opening tweet was: "Can you hear me now?"

2015-10-02

Social Media and the 'Information War’- Russia is Winning

The Kremlin wields a vast media apparatus to distort information, promote conspiracy theories & obfuscate observers about the crisis in Ukraine.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

ProfitBricks

ProfitBricks

ProfitBricks is a secure cloud computing infrastructure-as-a-service (IaaS) solution.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

SCADAfence

SCADAfence

SCADAfence offers cutting edge cybersecurity solutions designed to ensure the operational continuity of industrial (ICS/SCADA) networks.

V-Key

V-Key

V-Key is a global leader in software based digital security, providing solutions for mobile identity, authentication, authorization, and mobile payments for major banks.

Infosec (T)

Infosec (T)

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

Buglab

Buglab

The Buglab contest and Vigilante Protocol help companies all over the world to discover and fix vulnerabilities on their digital solutions or assets.

ARCON

ARCON

ARCON offers a proprietary unified governance framework, which addresses risk across various technology platforms.

Templar Shield

Templar Shield

Templar Shield is a premier information security, risk and compliance technology professional services firm serving North America.

Ethyca

Ethyca

Ethyca builds automated data privacy infrastructure and tools for developers and privacy teams to easily build products that comply with GDPR, CCPA Privacy Regulations.

Secura B.V.

Secura B.V.

Secura is an independent specialized cybersecurity expert, providing insights to protect valuable assets and data.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

ConnectSecure

ConnectSecure

ConnectSecure (formerly CyberCNS) is a global cybersecurity company that delivers tools to identify and address vulnerabilities and manage compliance requirements.

Trisul Network Analytics

Trisul Network Analytics

Trisul helps organizations deploy full spectrum deep network monitoring which can serve as a single source of truth for performance monitoring, security analytics, threat detection and compliance.

Infosec Institute

Infosec Institute

Infosec is a leading cybersecurity training company, we help IT and security professionals advance their careers with skills development and certifications.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.