News

2023-10-06

The Role of Circuit Breakers In Cybersecurity

The Importance Of Electrical Power: Circuit breakers can prove to be an invaluable asset as they help keep the cybersecurity infrastructure intact.

2023-10-05

Indian Police Crackdown On Social Media Financial Fraud

Victims were defrauded with the promise of huge returns on small investments, contacting them via the WhatsApp & Telegram instant messaging apps.

2023-10-06

Top Five Cloud Penetration Testing Tools

Cloud penetration testing is focused exclusively on cloud infrastructure. What are the current best tools & methodology? By Vidushi Dubey

2023-10-08

Industrial Control Systems Company Held To Ransom

Update: An international supplier of building technology & control systems has been attacked by the 'Dark Angels' ransomware gang.

2023-10-04

The Impact Of Artificial Intelligence On Cybersecurity

Balancing Promise With Reality: The belief that Artificial Intelligence alone can guarantee cybersecurity is overhyped.. By Helen Kruger

2023-10-03

Mapping Out The Journey To Zero Trust

Zero Trust has emerged as the gold standard cybersecurity methodology, but adopting it is a long term, evolutionary process. By John Linford

2023-10-03

Key Security Risks For Small Businesses

Lack Of Resources, Awareness & Expertise: Small businesses are as much at risk of cyberattacks as larger enterprises. By Jason Manar

2023-10-03

Security Gaps In Business-Critical Identity Services 

Active Directory Exploits: Cybercriminals aim to expand an attack from one compromised user account to the entire IT infrastructure. By Mickey Bresma

2023-10-02

British Royal Family's Website Targeted 

KillNet Go After King Charles: Russian hackers have claimed responsibility for a DoS attack, knocking the British royal website offline.

2023-10-02

Airline Customer Data Left Exposed For Months

Canada's Flair Airlines left sensitive customer databases exposed for about seven months, leaving customers highly vulnerable to identity theft.

2023-10-02

The Rapid Rise In DNS Attacks Demands New Approaches To Cyber Defense

Rethinking Data Resilience: Every Domain Name System has weaknesses & there are several ways that attackers can exploit them. By Mark Johnson

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

PhishLine

PhishLine

PhishLine helps Information Security Professionals meet and overcome the increasing challenges associated with social engineering and phishing.

VisionWare

VisionWare

VisionWare provide consulting services and solutions in areas covering both physical and digital security.

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

The mission of the PNP Anti-Cybercrime Group is to implement and enforce pertinent laws on cybercrime and other cyber related crimes and pursue an effective anti-cybercrime campaign.

e-Lock

e-Lock

e-Lock services include IT security consulting and training, security systems integration, managed security and technical support.

Sternum

Sternum

Sternum provides reliable and effective endpoint security for any IoT device, using robust technology and seamless integration.

PROOF

PROOF

PROOF is a Brazilian leader in cybersecurity. Our goal is to assist our Customers in managing security efficiently and in tune with business needs.

EU Joint Research Centre

EU Joint Research Centre

JRC is the European Commission's science and knowledge service which employs scientists to carry out research in order to provide independent scientific advice and support to EU policy.

Hold Security

Hold Security

Hold Security works with companies of all sizes to provide unparalleled Threat Intelligence services that actually make a difference.

Omnipotech

Omnipotech

Omnipotech is a complete managed service provider. From desktop to datacenter, all the technology support you need, under one umbrella.

AirEye

AirEye

AirEye is a leader in Network Airspace Protection (NAP). Block attacks against your corporate network launched from wireless devices in your corporate network airspace.

Celcom

Celcom

Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses.

Kompleye

Kompleye

Kompleye is a recognized cybersecurity and compliance audit organization that offer a comprehensive solution for different industries.

ProjectDiscovery

ProjectDiscovery

ProjectDiscovery is an open-source, cybersecurity company that builds a range of software for security engineers and developers.

Autobahn Security

Autobahn Security

Autobahn Security is a growing team of 80+ experts from 25+ nationalities, established in 5 countries. We’re working hard to make Autobahn Security the No. 1 solution for improved hacking-resilience.