FREE TO VIEW


« Back to News

2016-09-30

What To Know About Space Security

Space is increasingly important to the planet’s infrastructure - but it is also a potential battleground.

2016-09-30

More Questions About The Yahoo Breach

Pressure is mounting on Yahoo to admit when it knew about the attack, & whether there was a delay in reporting it.

2016-09-30

Twitter On The Block: Offers Over $13B

Both Google and Salesforce are interested in buying the company. Microsoft and Verizon have also been knocking.

2016-10-03

SWIFT Says Bank Cyber Attacks Are Here to Stay

SWIFT has admitted that cyber attacks are cracking the international bank messaging system & poor local security has grown worldwide.

2016-09-30

An Historic AI Partnership

The world’s largest technology companies hold the keys to some of the largest databases on our planet. Is that really healthy for society?

2016-10-03

AI Will Transform Microsoft

Microsoft are investing heavily in the belief that deep learning and artificial intelligence will transform the company.

2016-10-03

Your Online Security After The Yahoo Hack

The Yahoo data breach has left a potential half billion people at risk of theft of their online data. How can consumers protect themselves?

2016-10-03

New University Graduate Course: Cyber Anti-Terrorism

In addition to the UK's 'GCHQ approved' MSc programs there is strong US interest in the advanced courses in cybersecurity and anti-terrorism.

2016-09-28

A Peek Into French Signals Intelligence

France’s former top SIGINT spy confirms an advanced persistent threat and opens up about Snowden as well as other intelligence agencies.

2016-09-28

Volkswagen Launches Automotive Cybersecurity Firm

Volkswagen has teamed up with cybersecurity experts to establish a new company dedicated to automotive security.

2016-09-28

FBI Director Covers His Webcam With Tape

Both Facebook's Mark Zuckerberg and the FBI's James Comey think covering your webcam with tape might be a good idea.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

AVR International

AVR International

AVR educate, advise, analyse and provide professional, technical consultancy and support to ensure your business is safe, compliant and protected.

LogonBox Software

LogonBox Software

LogonBox Software specialises in producing a cost-effective range of Network Security and Identity Management software solutions for all sizes of Enterprise.

Cyber Security Research Centre - University of Cardiff

Cyber Security Research Centre - University of Cardiff

Cardiff University's Centre for Cyber Security Research is a leading UK academic research unit for cyber security analytics.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

ENEA Qosmos Division

ENEA Qosmos Division

Qosmos, a division of Enea, leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures.

Cyverse

Cyverse

Cyverse is a cyber-security firm which provides corporations with state-of-the-art cyber-security service-based and technological solutions made in Israel.

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

LiveVault

LiveVault

LiveVault delivers fully automated, turnkey, backup over the Internet or a private network connection for uninterrupted remote data protection.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

Business Continuity

Business Continuity

Business Continuity delivers integrated IT solutions for cybersecurity, virtualization, cloud platforms and operational security solutions.

LightEdge Solutions

LightEdge Solutions

LightEdge’s highly-trained compliance and security experts take the guesswork out of keeping your business protected.

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

CONCORDIA

CONCORDIA

Concordia is a Cybersecurity Competence Network with leading research, technology, and competences to build the European Secure, Resilient and Trusted Ecosystem.

Portshift

Portshift

Portshift leverages the power of Kubernetes and Service-Mesh to deliver a single source of truth for containers and cloud-native applications security.

Mosyle

Mosyle

Businesses and educational institutions rely on Mosyle to manage and secure their Apple devices and networks.

Oak9

Oak9

Oak9's Security as Code platform dynamically secures Infrastructure as Code (IaC) and deployed cloud workloads, automatically.