NEWS > Cybersecurity News


« Back to News

2018-05-01

DNA Data Storage Moves Closer To Becoming Reality

DNA might replace hard drives & other storage media and there is significant progress, including new, zero-error individual-file data retrieval.

2018-05-01

Facebook Could Save Your Life

Constant Surveillance Can Be Useful: First responders can now use a special Facebook service when conducting rescue missions.

2018-04-30

Instagram Allows Users To Download Everything Shared

Instagram will let users download their personal data, including previously shared photos, videos and messages, as it prepares for GDPR.

2018-05-08

Six Benefits From Artificial Intelligence & Machine Learning

Data is the big new strategic asset. Organisations that can effectively harness AI and Machine learning to exploit their data will be big winners.

2018-04-26

Artificial Intelligence Is Too Narrow

AI is based on sophisticated algorithms and the brute force of huge computing power. This makes it powerful, but its very specificity is a problem.

2018-05-08

Killer Robots Are A Revolution in Warfare

Fully autonomous weapons do not yet exist, but senior military thinkers say the use of robots will be widespread in warfare in a matter of years.

2018-04-25

Listening To Your Inner Voice

MIT researchers invent a wearable device that can read people’s internal voice, allowing them to control devices and ask queries without speaking.

2018-04-27

How AI & Machine Learning Can Revolutionise eCommerce

Its Not Just Amazon: As the right data and expertise fall into place, AI and machine learning will be game changers for eCommerce brands.

2018-04-25

The Apps That Map Violence

Residents of Rio de Janeiro are flocking to use crowdsourcing apps and following the social network pages of crime-watch groups for safety.

2018-04-23

A New Distributed Database Adds GDPR Controls

The company with a terrible name introduces a useful new cloud data product to facilitate automated multi-territory compliance with GDPR.

2018-04-23

The Cambridge Analytica Scandal 'highlights need for AI regulation'

British legislators are worried about the potential for misuse & monopolisation of data by big technology companies operating in the UK.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

Coalition

Coalition

Coalition combines comprehensive insurance and proprietary security tools to help businesses manage and mitigate cyber risk.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Consulting Services to help you secure your mission-critical systems.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

Cyolo

Cyolo

Cyolo’s Secure Access Service Edge (SASE) platform securely connects onsite and remote users to authorized assets, in the organizational network, cloud or IoT environments and even offline networks.

Safetech Innovations

Safetech Innovations

Safetech Innovations is a team of cyber security experts, always at your service. We use human and cyber intelligence to help your business in uncertain times.

Cyber Security Cooperative Research Centre (CSCRC)

Cyber Security Cooperative Research Centre (CSCRC)

The CSCRC provides frank and fearless research and in-depth analysis of cyber security systems, the cyber ecosystem and cyber threats.

OSI Security

OSI Security

OSI Security's primary services include penetration testing, security auditing, web application security testing and risk management.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

LogicBoost Labs

LogicBoost Labs

LogicBoost Labs has the expertise, experience, funding and connections to make your startup succeed. We are always interested in new ways to change the world for the better.

Dawgen Global

Dawgen Global

Dawgen Global is an integrated multidisciplinary professional service firm in the Caribbean Region providing a range of services including Risk Management and Information Systems Assurance.

Visory

Visory

Great businesses depend on great technology. We make sure our clients go to market with enterprise-level technology and world-class security for their data and infrastructure.

Nasuni

Nasuni

The Nasuni File Data Platform offers the protection, detection, and recovery of file shares from ransomware attacks or random disasters within minutes.

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.

Blockaid

Blockaid

Blockaid is the onchain security platform for monitoring, detecting, and responding to onchain and offchain threats.