News

2015-08-14

The NSA Playset: 5 Better Tools To Defend Systems

Cutting edge security tools made accessible & easier to use, tapping into the open source software community.

2015-08-14

Twitter says U.S Government Want More User Account Information

Twitter reveals that requests for account information from governments has jumped 52%, mostly to do with criminal investigations.

2015-08-14

France & UK on the Edge of Kafkaesque Surveillance

Are the surveillance tools that France and Britain are using too blunt and intrusive for modern democracies?

2015-08-14

HTC: Rendered Worthless By Insecurity?

Competition from above and below, combined with a shocking security lapse, knock HTC for six.

2015-08-14

US Internet Giants Join to Curb Child Sex Abuse

Facebook, Google, Microsoft, Twitter and Yahoo are doing the right thing.

2015-08-14

Darwinian Robotic Evolution

Artificial evolution of physical systems to create self-learning, improving robots.

2015-08-14

No. Petition to Pardon Snowden Rejected by Obama

The U.S.President and a majority of lawmakers maintain that Snowden must be prosecuted for violating the law.

2015-08-13

Artificial Intelligence Decodes ISIS

Artificial intelligence has been used to gain insights into the tactics of Islamic State.

2015-08-11

How To Avoid All-Out War in Cyberspace

The most cantankerous states in cyberspace tend to behave in a responsible manner because to act otherwise would invite terrible consequences.

2015-08-11

Inside the FBI Cyber Division

The biggest threats the FBI's new agents will face are not the ones they will confront on the streets, but the ones online.

2015-08-11

Will Robots Eliminate Many Humans From the Workplace?

The fear of millions of jobs being automated out of existence by robots is real. Here's how it will change the world -- for the better.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Satisnet

Satisnet

Satisnet is a leading Security Reseller, Managed Security Services Provider (MSSP) and Cyber Training Innovator, with operations throughout the UK, EMEA and United States.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

GrammaTech

GrammaTech

GrammaTech is a leading developer of software-assurance tools and advanced cyber-security solutions.

Datiphy

Datiphy

Datiphy's data-centric security platform uses behavioral analytics, and data-centric auditing and protection capabilities to mitigate risk.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

IGX Global

IGX Global

IGX Global is a provider of information network and security integration services and products.

Oneconsult

Oneconsult

Oneconsult provides cyber security services focusing on penetration tests / ethical hacking, ISO 27001 security audits and incident response & IT forensics.

ECS

ECS

ECS is a leading information technology provider delivering cloud, cybersecurity, software development, IT modernization, and advanced science and engineering services.

Crayonic

Crayonic

Crayonic digital identity technologies protect and guarantee the identity of people and things.

itbox.online

itbox.online

Itbox.online offers IT solutions to ensure that your company's technologies are always available and secure as your business demands.

EPIC Insurance Brokers & Consultants

EPIC Insurance Brokers & Consultants

EPIC is an insuarnce broker and consultancy firm. Risk management services include risk consultancy and cybersecurity insurance.

SignalSEC

SignalSEC

SignalSEC provides vulnerability intelligence, malware analysis, penetration testing and associated training services.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

SecuCenter

SecuCenter

Secucenter is a trusted partner for SOC services, offering security expertise in a cost-effective way.

Orca Tech

Orca Tech

Orca Tech brings together a portfolio of complimentary vendor in the IT security industry to help provide a complete solution to meet the requirements of our Partners across all sectors.

ecfirst

ecfirst

ecfirst's mission is to establish AI platforms and service capabilities to assess and manage client compliance with global mandates on a continual basis to secure business data and assets.