FREE TO VIEW


« Back to News

2016-03-16

Data Security Puts Innovation At Risk

As the challenge of protecting users, applications & data against cyberattack grows, organisations are struggling to innovate whilst staying secure.

2016-03-15

Communications Breakdown: CISOs & Company Boards

We Don't Talk Anymore: Chief Information Security Officers (CISO) and the board of directors don't adequately share cybersecurity threat information.

2016-03-15

Who Is Winning The Cyber War?

Who is winning the cyber war - the criminals and hackers or the network and system defenders? The State of Cybersecurity: 2016.

2016-03-14

Recovered IS Document Reveal 22,000 Recruits

Secret Islamic State documents naming 22,000 jihadist fighters including 16 Britons intercepted by German intelligence.

2016-03-14

Google's AI Machine To Battle 'Go' Champion

Master of the ancient Asian board game Go will sit down to defend humanity against Deep Mind.

2016-03-14

China Cracks Down On Top Hong Kong Newspaper

Firewall Censorship: Social media accounts of the South China Morning Post suspended and the media group's news websites blocked in China.

2016-03-11

Apple’s Best Defence Against The FBI Is The One It Can’t Admit

Some say the debate over privacy embodied in Apple v FBI conceals the problem that iPhone already has backdoors which Apple hasn’t yet closed.

2016-03-18

UK Bosses - Heads In The Sand Over Cybercrime

Clear evidence of the growing threat is still not causing British businesses leaders to increase their protection.

2016-03-19

Underwater Drone Technology Could Doom Trident

New technologies, both unmanned underwater vehicles (UUV) and advanced sensors, could make the world’s oceans “transparent” to submarines.

2016-03-09

Cool Job: Professor of Intelligence Analysis Program at James Madison University

James Madison University are looking for someone to teach the next generation of intelligence analysts & cyberspies.

2016-03-08

Cyber Criminals Have Evolving Tactics

The financial world should be bracing itself for what is set to be a big year for cyber-crime, according to ThreatMetrix's new report.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

SANS Institute

SANS Institute

SANS is the most trusted and by far the largest source for information security training and security certification in the world.

ACI Worldwide

ACI Worldwide

ACI Worldwide powers electronic payments for more than 5,000 organizations around the world.

Bunifu Technologies

Bunifu Technologies

Bunifu Technologies is an Information Security and Custom Software Development Company.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

Cyber Threat Defense (CT Defense)

Cyber Threat Defense (CT Defense)

CT Defense specialize in penetration testing and security assessments.

Dynamic Quest

Dynamic Quest

Dynamic Quest is a managed IT, cloud and security services companies, providing a comprehensive range of technology services including cybersecurity, backup and disaster recovery.

VCG Group

VCG Group

VCG provides everything you need for the design, implementation and management of data centres, cyber-secure enterprise networks, cloud and connectivity services.

IMQ Group

IMQ Group

IMQ is one of Europe’s top players in the field of conformity assessment. We offer certification services to support all the major sectors of the manufacturing and service industries.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.

aFFirmFirst

aFFirmFirst

aFFirmFirst is a unique software solution offering a simple yet effective way for businesses to protect and control their online images and logo, as well as allowing one-click website verification.

Benchmark Executive Search

Benchmark Executive Search

Benchmark specializes in finding elite talent for startup, emerging-growth and mid-cap companies offering game-changing technologies or innovative services to the federal and commercial markets.

Fortress SRM

Fortress SRM

Fortress SRM protects companies from the financial, operational, and emotional trauma of cybercrime by improving the security performance of its people, processes, and technology.

DeepTempo

DeepTempo

At DeepTempo, we build AI models and related software that protect enterprises and service providers from sophisticated cyber threats.

7AI

7AI

7AI is the first agentic security platform that harnesses the speed, swarming capabilities, and power of AI to finally give defenders the advantage over evolving threats.

Pantherun Technologies

Pantherun Technologies

Pantherun is a pioneering force in the realm of encryption technology and data protection solutions.