FREE TO VIEW


« Back to News

2016-04-12

UK Investigatory Powers Bill Will Cost £1bn To Implement

The UK Home Office has been told its plans to retain web-browsing history of all British citizens for 12 months would cost in excess of £1bn.

2016-04-13

The Next Decade Will Be About The Industrial Internet

Corporate giant GE has outlined some fundamental insights about the digital transformation efforts of industrial businesses.

2016-04-13

Execs: We’re Not Responsible For Cybersecurity

More than 90% of corporate executives say they can't read a cybersecurity report and are not prepared to handle a major attack.

2016-04-11

Will Capitalism Survive The Robot Revolution?

If 90 percent of human jobs are replaced by robots in the next 50 years, will capitalism remain the ideal economic system?

2016-04-11

Eight Reasons Why US CEOs Care About New EU Privacy Laws

A major change is on the way in how American companies must handle European citizens’ personal data.

2016-04-11

Taliban App Removed From Google Store

Alemarah, an app for Android phones created by Islamist fundamentalist group the Taliban, has been removed from Google's Play Store.

2016-04-14

The Darkest Web

TOR is an essential tool for carrying out investigations in law enforcement. It is also used by criminals. Opinion by Max Vetter (distressing content)

2016-04-08

WhatsApp Implements Encryption

A victory for privacy has been won after Whatsapp’s decision to encrypt end to end messaging.

2016-04-06

Biggest Data Leak Ever Exposes World's Most Rich & Powerful

An obscure law firm in Central America is the source of what's being called the largest information leak in history.

2016-04-11

27% Of Known Malware First Appeared In 2015

PandaLabs, the R&D laboratory of Panda Security, both detected and neutralized more than 84 million new malware samples throughout 2015.

2016-04-06

UK Surveillance Powers Bill Could Force Startups To Build In Backdoors

The UK's proposed new surveillance law enables state agencies to compel even very small startups to build backdoors into their systems.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

National Defense Industry Association (NDIA) - USA

National Defense Industry Association (NDIA) - USA

The National Defense Industrial Association Cyber Division contributes to US national security by promoting interaction between the cyber defense industry, government and military.

ComCode

ComCode

ComCode provides consulting services and solutions in the area of digitization and cyber security for mid-sized and big businesses.

Seavus Accelerator

Seavus Accelerator

Seavus Accelerator's goal is to create an enabling and stimulating environment for start-ups growth and provide continuous high quality acceleration and investment support.

Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions Corp. is a North American IT solution provider delivering advanced analytics, cloud, cybersecurity, and managed services solutions.

Security Management Partners (SMP)

Security Management Partners (SMP)

Security Management Partners (SMP) is a trusted partner to financial services, healthcare and businesses that need to manage their information, securely.

Secuvant

Secuvant

Secuvant is an independent IT Security firm providing enterprise-grade IT security services to mid-market organizations.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

Kiberna

Kiberna

Kiberna are a small but niche company specialising in data driven security to manage your cyber risks.

Kyndryl

Kyndryl

Kyndryl has a comprehensive portfolio that leverages hybrid cloud solutions, business resiliency, and network services to help optimize your IT workloads and transformations.

Aquia

Aquia

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges.

Resonance Security

Resonance Security

Resonance offers powerful cybersecurity aggregation software that makes protecting against full spectrum cybersecurity threats effortless no matter what your technical level, budget, or scope.

BioID

BioID

BioID are a German company offering deepfake detection, liveness detection, facial authentication & identity verification as a Service. 

Appranix

Appranix

Appranix delivers Cloud App Resilience with app-centric entire cloud resources backup, restore, and cross-region disaster recovery.

Q-Bird

Q-Bird

Q*Bird's mission is to provide equipment for the current, and future European quantum internet.

Ncontracts

Ncontracts

Our mission at Ncontracts is to continually improve our clients’ ability to manage risk and compliance.