News

2023-09-26

Quadruple Extortion  Ransomware

Phases Of The Extortion Cycle: Criminals are getting more focused, specialized & effective in maximizing the ransom they extract from their victims.

2023-09-26

Severe Risks From Remote Access Exposure

Response Time: Organisations are finding it difficult to manage their attack surfaces at a speed & scale necessary to combat threat actor automation.

2023-09-25

Is Your Business Ready To Embrace Artificial Intelligence? 

AI presents itself in a different way - it’s an entirely new area that requires continuous development and a new set of rules. By Andy Dunn

2023-09-25

Unmasking The Silent Threat Of Cryptojacking 

Zombie Devices: Unlike ransomware, cryptojackers want to remain in the system for as long and quietly as possible. By Spencer Starkey

2023-09-25

Zero-Trust: Protecting From Insider Threats

Unintended Consequences: Organisations need to constantly guard against insider threats - the cybersecurity risk that comes from within.

2023-09-22

Europol Identifies The Top Cyber Threats

Ransomware affiliate programs have become the main business model for ransomware groups, deploying multi-layered extortion techniques.

2023-09-22

Jargon Buster: Untangling The Complexity In Cybersecurity 

Device Security Affects Us All: Wouldn’t it be helpful to return to basics to explain & design security in a much easier way? By Chris Meidinger

2023-09-22

Exploring How Generative AI Is Contributing To Cybersecurity Threats & Risks

Generative AI is transforming businesses, while simultaneously posing significant risks and dangers in the hands of hackers. By Farwa Sajjad

2023-09-21

Australian Government Suffers A Widespread Ransom Attack

Prolific ransomware group ALPHV hacked a law firm providing services to numerous government agencies, facilitating a wave of secondary attacks.

2023-09-20

Chinese Hackers Have Been Reading US Government Emails

An advanced Chinese spying campaign that involved breaches of Government & Legislature emails went undetected for months.

2023-09-20

Enterprise Cybersecurity Today: A Vast Landscape To Secure

The trends towards remote working, online shopping & banking have multiplied the number of endpoints that need protection. By Richard Yew

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

GovCERT.CZ

GovCERT.CZ

GovCERT.CZ is the Government Computer Emergency Response Team of the Czech Republic.

CybergymIEC

CybergymIEC

CybergymIEC is a global leader in cyber defense solutions and training services.

Cisco Talos

Cisco Talos

Talos is an industry-leading threat intelligence solution that protects your organization’s people, data and infrastructure from active adversaries.

SQNetworks

SQNetworks

SQNetworks provides a full range of cybersecurity consultancy, services and solutions.

Viscount Systems

Viscount Systems

Viscount Systems is a global security software solutions company that is changing the way access control is deployed and managed in the enterprise.

National Cyber Security Agency (NACSA) - Malaysia

National Cyber Security Agency (NACSA) - Malaysia

NACSA is the leading government agency in Malaysia responsible for the development and implementation of national cyber security management policie and strategies.

IronNet Cybersecurity

IronNet Cybersecurity

IronNet’s product and services provide enterprise-wide security management and visibility of your network, users and assets.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

DataDome

DataDome

DataDome offers real-time AI protection against all OWASP automated threats, including credential stuffing, layer 7 DDoS attacks, SQL injection & intensive scraping.

CyPhyCon

CyPhyCon

CyPhyCon is an annual event exploring threats and solutions to cyber attacks on cyber-physical systems such as industrial control systems, Internet of Things and Industrial Internet of Things.

Trusted CI

Trusted CI

Trusted CI, the NSF Cybersecurity Center of Excellence is comprised of cybersecurity experts who have spent decades working with science and engineering communities.

SystemExperts

SystemExperts

SystemExperts is a premier provider of IT compliance and cyber security consulting services.

OwnBackup

OwnBackup

OwnBackup proactively prevents you from losing mission-critical data and metadata with automated backups and rapid, stress-free recovery.

Technisanct

Technisanct

Technisanct works with Governments, especially Law Enforcement and Defence agencies, helping them in monitoring threats, managing their data and resolving their forensic needs.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.