FREE TO VIEW


« Back to News

2016-12-02

War In The Information Age

In the information age of warfare, advantage will be achieved through the speed and integration of actionable data.

2016-12-01

Medical Devices Are The Weak Link

For many users of the OneTouch Ping insulin pump, the benefit of ease of use has been outweighed by the fear of hacking.

2016-11-30

UK National Cyber Security College Locates To Bletchley Park

The home of the Enigma codebreakers Bletchley Park is set to become the home of the UK’s first ever National College of Cyber Security.

2016-11-30

Facebook’s Secret Censorship Deal With China

Facebook has developed censorship software in an effort to get China to lift its seven-year ban on the world’s largest social network.

2016-11-30

From A Distance: Robot Remote Control

AI software and robotics-based hardware designed to achieve an exoskeleton that can mimic human movements from long distance.

2016-11-30

US Navy Personnel Data Breached

The US Navy is investigating a data breach after personal information of more than 130,000 sailors was accessed.

2016-11-30

Jihadi Cybercrime

Islamic State inspired websites & social media outlets don't just promote Jihad. They also teach cybercrime techniques.

2016-11-30

Malware Makes ATMs 'spit cash'

Malicious software used by the gang known as Buhtrap has been hacking Russian bank cash machines and is coming this way soon.

2016-11-29

Can Snowden Testify in Berlin?

Political Manoeuvers: Opposition parties seek legal protection for Edward Snowden to address German Parliamentarians.

2016-11-29

CIA Chief - Trump Picks Pompeo

CIA Director-designate Mike Pompeo has supported NSA surveillance programs and criticised Silicon Valley's stance on encryption.

2016-11-29

US Election Recounts In ‘Hacked’ States?

Hacking The Vote: Calls for a ballot recount in three critical swing states renew concerns over possible US electoral interference.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

Awake Security

Awake Security

Awake Security offer a security solution built on an AI platform that acts like the human brain to sense, detect, and respond to threats you may not even know exist.

Mitre

Mitre

At Mitre we work across government to tackle challenges to the safety, stability, and well-being of our nation. Areas of expertise include Cybersecurity.

Pareteum

Pareteum

Pareteum is a leading Global provider of mobile networking software and services. Our mission is to provide a single solution to the problem of fully enabling and securing the Mobile Cloud.

United Biometrics

United Biometrics

United Biometrics is an anonymous and real-time authentication platform designed to stop the fraud for mobile payments, e-Commerce and applications.

Forum of Incident Response & Security Teams (FIRST)

Forum of Incident Response & Security Teams (FIRST)

FIRST is the global Forum of Incident Response and Security Teams.

Zacco

Zacco

Zacco offer a 360° perspective on intellectual property: From patent filing and trademark registration to software development, digital brand protection, cyber security and portfolio management.

Octo

Octo

Octo, an IBM company, is a technology firm dedicated to solving the Federal Government’s most complex challenges, enabling agencies to jump the technology curve.

CIBR Warriors

CIBR Warriors

CIBR Warriors are a leading cyber security and networking staffing company that provides workforce solutions with businesses nationwide in the USA.

Bleam Cyber Security

Bleam Cyber Security

Bleam is a leading provider of Managed Cyber Security Services and Information Security consulting. We deliver enterprise class security services to UK SME’s to stop data breaches.

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

Secure Diversity

Secure Diversity

Secure Diversity is an innovative non-profit organization with leaders that think out of the box to create strategies & solutions to increase diversity in the cybersecurity industry.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Infodot Technologies

Infodot Technologies

Infodot Technologies specialize in a co-managed IT support and services approach, where businesses share their IT responsibilities with a skilled Managed IT Services Provider (MSP).