Does AI make us dependent on Big Tech?The assumption is that banks would find it impractical to independently develop the extensive computing power required for AI technologies. Heavy relian… Read More
What will the short-term and the long-term impact of generative AI be on security? That was the big question at the recent InfoSecurity Europe 2024 event. Find out what we heard at the event… Read More
Welcome to Propeller-Tech’s comprehensive event guide for 2024! This curated list is designed to keep you informed and connected with the latest trends, insights, and networking opport… Read More
Next-Gen SIEM provides full data visibility and maximum searchability along with real-time threat detection and response with a guaranteed cost savings of 50% or more.
LOS ANGELES, Calif., M… Read More
Ransom and AI generated attacks driving cybersecurity investment according to survey by Infosecurity Europe Infosecurity Europe, ExCeL London, 21 May 2024: Infosecurity Europe, the most… Read More
Generative AI and Deepfake Expert, Henry Ajder to discuss the impact of generative AI on cybersecurity at Infosecurity Europe 2024 Ajder to address the future of generative AI as 50% of surv… Read More
Over two-thirds of IT security decision-makers report an increase in cybersecurity budgets for 2024 Infosecurity Europe opens registration for 2024 with cyber investment a significant talkin… Read More
London’s trade shows are vibrant and have diverse events that showcase various industries and interests. They often occur in large, well-known venues like the ExCeL London or Olymp… Read More
British cybersecurity company Goldilock has been selected as one of 30 participants out of 1,300 applicants, to be accepted into the NATO DIANA accelerator programme, on merit of its physica… Read More
As generative AI rapidly evolves, one of the biggest risks that is being discussed is the potential for the technology to be used to generate disinformation and misinformation. This me… Read More
Voor wie op de hoogte wil blijven van de laatste nieuwe ontwikkelingen binnen de cybersecurity en alvast een stukje budget wil reserveren hierbij een overzicht van Europese cyber events in 2… Read More
Written with Zaklina Ber Forrester analysts visited Infosecurity Europe 2023 this year and took over 45 meetings with vendors, service providers and CISOs at the event. Walking into the… Read More
Company to showcase recent cyber threat intelligence and digital risk protection enhancements to its leading external cybersecurity platform at Stand E45
ZeroFox (Nasdaq: ZFOX), an e… Read More
Infosecurity Europe opens registration for 2023 with cyber investment a critical talking point at the upcoming event Infosecurity Europe, the most influential information securit… Read More
Entries open for DSIT competition as Infosecurity Europe look to crown the UK’s Most Innovative Cyber SME 2023 Cybersecurity budgets are tipped to increase or are expected to be mainta… Read More
Security and threat intelligence company Silobreaker has announced new geopolitical threat intelligence capabilities with RANE (Risk Assistance Network + Exchange). The tie-up will see Silob… Read More
Do you want to participate in the upcoming trade fairs in the United Kingdom to expand your business? Then, you must consider collaborating with an experienced exhibition stand builder compa… Read More
The cyber-attack on US firm Viasat’s KA-SAT satellites in Ukraine on February 24, 2022, prompted one of the largest formal attributions of a cyber-attack to a nation-state in history… Read More
The volume of compromised credit cards offered for sale on cybercrime markets has dropped sharply over the past few years, although UK figures rose, according to Cybersixgill.The security fi… Read More
Innovation and collaboration top the agenda for Infosecurity Europe 2023, as security leaders tackle overwhelming security threats Industry must leverage talent, shared knowledge and a… Read More
Are you an IT professional looking for platforms to discuss emerging technologies and network with peers?
For you, we put together a long list of IT & tech conferences summoning all geek… Read More
If you work in cybersecurity, it is vitally important to keep abreast of latest news, trends and advancements in the field.I have put together a list of top cybersecurity news sites tha… Read More
The summer may be fast approaching, but there are still several top cyber security conferences to sign up for in the UK. Below we’ve listed our Top UK Cyber Security Conferences in 202… Read More
I have spent the last three days attending Infosecurity Europe 2019, the largest security trade show in the UK and Europe. As ever, before coming I have tried to predict the big theme or tre… Read More
Speed of change means threat landscape could outrun cybersecurity defences – with insider threats and ransomware presenting greatest risk Richmond, Surrey, UK, 0900 hours, 10 Dec… Read More
More moon stuff (this guy does good work that I align with):
Jason Q Janiszewski
15h ·
Go look at the moon right now. Something is getting re… Read More
‘Tech Trailblazers @10’ celebrates tenth awards version with startup recommendation and insights
London, UK – July seventh 2021 – The Tech Trailblazers Awards righ… Read More
A third of IT staff worried about them
A third of IT professionals say they are very concerned about the security risks third party providers present to their organisation, according to the… Read More
IT leadership: 3 ways to enable continuous improvement"If technical leadership has one job, it is to tend to that socio-technical system so that team members can spend as much time as poss… Read More
Raj Samani is Chief Scientist at McAfee who has helped many law enforcement companies tackle cybercrimes in the past. Raj has also worked as an advisor to the European Cybercrime Centre (EC3… Read More
Outbound Email Errors Cause 93% Increase in Breaches Egress CEO Tony Pepper said the problem is only going to get worse with increased remote working and higher email volumes, which cre… Read More
Software Defined Perimeter (SDP): The deploymentSDP architectures are user-centric; meaning they validate the user and the device before permitting any access. Access policies are created ba… Read More