News

2023-07-08

The Netherlands To Restrict Computer Chip Equipment Exports To China

The Dutch will limit exports of some semiconductor manufacturing equipment, following US pressure to cut China's access to chipmaking tools. 

2023-07-07

Nagoya Re-Opens After Ransom Attack

Japan’s largest maritime port was shut down by LockBit ransomware, disrupting cargo as operators rushed to prevent a wider delay in shipments.

2023-07-06

Financial Services Cyber Compliance Is About To Get Harder

The EU Digital Operational Resilience Act: Save yourself a future headache by getting a head start on DORA regulations. By Simon Paterson

2023-07-05

Twitter Hacker Goes To Jail

PlugwalkJoe: A British man who hacked famous Twitter accounts, including Joe Biden, as part of a Bitcoin scam has been jailed in the US.

2023-07-05

A Brief History Of Artificial Intelligence & Its Potential Future

AI can process large amounts of data in ways that humans cannot. Will It ever be able to recognise patterns, make decisions and judge like humans?

2023-07-04

The Nuclear Governance Model Won’t Work For AI

AI is increasingly discussed as an existential threat on the same scale as nuclear weapons. This parallel distorts the conversation about regulation.

2023-07-03

The CIA Has A Social Media Campaign Just For Russians

The campaign includes a new CIA channel on Telegram - a widely used social media network that offers a source of unfiltered news in Russia.

2023-07-03

Canada Might Lose Its Dispute With Google

Costly News Links: Google and Meta, the owner of Facebook and Instagram are saying they will block local news from their platforms in Canada.

2023-07-03

Thousands Of WordPress Sites Exposed 

Ultimate Member Plugin: Over 200,000 WordPress sites have a newly found security defect, leaving them dangerously exposed to hackers.

2023-07-03

The Seven Stages Of Cyber Resilience:

The Emotional Roller Coaster Of Data Protection: For small & medium businesses, data resilience is a critical necessity. By Richard Massey

2023-07-03

How To Back Up GitLab To Prevent Data Loss 

GitLab Backup Methods: Streamlining backup processes, ensure data reliability & let DevOps focus on their core development tasks.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cavirin

Cavirin

Cavirin’s Automated Risk Analysis Platform reduces risk and automates security and compliance.

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

Synack

Synack

Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners.

Qufaro

Qufaro

Qufaro is a new initiative designed to make it simpler for those with career ambitions in cyber security to access the UK’s cyber-specific education and innovation opportunities.

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

Tecnalia Research & Innovation

Tecnalia Research & Innovation

Tecnalia is the largest center of applied research and technological development in Spain, a benchmark in Europe and a member of the Basque Research and Technology Alliance.

Intechtel

Intechtel

Intechtel is a cyber security company, in addition to providing other internet, technology and telephone services.

Viettel Cyber Security

Viettel Cyber Security

Viettel Cyber Security is an organization under the Military Telecommunication Industry Group, conducting research and developing information security solutions for domestic and foreign customers.

AB Handshake

AB Handshake

AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic.

ProArch

ProArch

ProArch is a global team of multidisciplinary experts in cloud, infrastructure, data analytics, cybersecurity, compliance, and software development.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

M.Tech

M.Tech

M.Tech is a leading cyber security and network performance solutions provider. We work with leading vendors to bring optimal solutions to the market through a channel of reseller partners.

SequelNet

SequelNet

SequelNet is an emerging MSP, providing 360° business IT solutions and consulting services.

SPIE Switzerland

SPIE Switzerland

SPIE Switzerland AG, a subsidiary of the SPIE Group, is a Swiss full-service provider of ICT, multi-technical and integral facility services.

P3M Works

P3M Works

P3M Works delivers Cyber Security and Digital Transformation projects across both private and public sector clients.

Maltiverse

Maltiverse

Maltiverse is a threat intelligence platform that provides security teams with high-fidelity threat data and malicious IOCs to enhance detection and response.