For continued FREE access to Articles and Directory Listings please LOGIN to your Account or REGISTER.
2025-05-29

How Ransomware's Industrialization Impacts SOC Operational Tempo

The latest evolution of the ransomware industry is prompting security teams to adopt more modern tools & more agile workflows. By Matt Muller

2025-06-03

Cartier Confirms Customer Data Exposure

The Luxury jewelry retailer has disclosed a security breach in a customer notification, following unauthorized system access & data exposure.

2025-06-03

Enterprises Can Learn from Government Cyber Defence

DNS As A Strategic Asset: Used properly, DNS becomes both shield and sensor; blocking threats and helping to detect them. By Craig Sanderson

2025-06-03

DORA - The Regulatory Awakening

Identity Threat Detection & Response: Identity security can help financial services deal with the challenges of DORA compliance. By Mo Joueid

2025-06-02

Scattered Spider Hackers Get Busy

Scattered Spider Targeting Retailers: The cybercrime group linked to multiple high-profile retail breaches increasing its international activities.

2025-06-02

British NHS Trusts Hit By Major Cyberattack: Data Stolen  

Healthcare Trusts In London & Southampton Targeted: Patient data may have been compromised due to an Ivanti Mobile Endpoint vulnerability.

2025-05-30

Crypto Company Hit For $400m

Coinbase Data Breach: One of the world’s largest crypto-currency firms has disclosed a disastrous cyber attack which has cost it around $400m.

2025-05-29

Significant Breach Disrupts Victoria’s Secret

The renowned lingerie retailer, Victoria’s Secret, is the latest high-profile target in a surge of recent attacks sweeping across major global brands.

2025-05-28

Failure Happens, But Recovery Can Be Managed Intelligently

Better resilience & response to disruption requires equal parts critical thinking, culture, and practice, as much as technology. By Eduardo Crespo

2025-05-28

Avoiding Low-Tech, Human-Centric Cyber Attacks

Social Engineering Can Bypass Defences: Cybercriminals are finding success in low-tech, high-impact, human-centric tactics. By Oliver Paterson

2025-05-28

Eight Best Solutions For Managing Compliance In Government Contracting

Make Compliance A Strategic Advantage: Robust platforms & specialized tools are the best solutions for managing compliance in government contracting.

2025-05-27

Cyber Attack On Adidas Highlights A Rising Tide Of Retail Sector Threats

Global sportswear giant Adidas becomes the latest high-profile target in a surge of cyberattacks affecting major retailers worldwide.

Subscribe!

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

mile2

mile2

Mile2 develop and deliver proprietary vendor neutral professional certifications for the cyber security industry.

Paessler

Paessler

Paessler is a leading worldwide provider of network monitoring software.

Applicure Technologies

Applicure Technologies

Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.

Center for Internet Security (CIS)

Center for Internet Security (CIS)

CIS is a nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats.

CodeSealer

CodeSealer

CodeSealer provide invisible end-to-end user interface protection with a unique web security solution to eliminate Man-in-the-Middle and Man-in-the-Browser vulnerabilties.

Ravelin Technology

Ravelin Technology

Ravelin prevents chargebacks, fraud, and account takeover. Machine learning and human insight combine for highly accurate fraud detection and prevention.

Sponge

Sponge

Sponge is a world-renowned digital learning provider on a mission to make learning unforgettable.

RCMP National Cybercrime Coordination Unit (NC3)

RCMP National Cybercrime Coordination Unit (NC3)

As set out in the Government of Canada's National Cyber Security Strategy, the RCMP has established the National Cybercrime Coordination Unit (NC3).

01 Communique Laboratory

01 Communique Laboratory

01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security.

Udacity

Udacity

Udacity's mission is to train the world’s workforce in the careers of the future. Our programs range from beginner to expert levels and deliver the hands-on skills for real-world expertise.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.

Synagex

Synagex

Synagex Modern IT is a simple IT and cybersecurity solution for businesses.

Amtivo Group

Amtivo Group

Amtivo provides Certification, Inspection and Training services to national and local Government bodies, multi-nationals, enterprise clients and SMEs.

StrongDM

StrongDM

StrongDM is the leader in Zero Trust Privileged Access Management (PAM).

Planisys

Planisys

Planisys is a cybersecurity leader specializing in cutting-edge DNS security and email security solutions.

DOT Security

DOT Security

DOT Security provides advanced security services for businesses of all sizes.