News

2023-06-29

Today’s CISO: How The Role Has Evolved

A Transformational Role: CISOs are integral to fundamental business decisions and are now entitled to a seat at the boardroom table. By Frank Kim

2023-06-28

Browser-Based Social Engineering Trends

Watchguard's latest report shows three of the four new malware threats originated in China and Russia with living-off-the-land attacks on the rise.

2023-06-28

Phishing – It’s Not About Malware (Or Even Email)

Phishing Is No Longer About Infecting Your Computer: Experts at SANS have analysed the latest trends and key indicators. By Lance Spitzner

2023-06-27

Innovation In Cyber Security: NDR Meets XDR

Network Detection and Response and Extended Detection and Response have a synergy that leads to stronger cyber defenses.

2023-06-26

How Does Your Board Measure Cyber Resilience?

Adopting A Prevention-First Approach: Going beyond traditional cybersecurity measures means prioritising resilience. By Deryck Mitchelson

2023-06-26

Employees To Blame For 70% Of Corporate Data Breaches

The Remote Work Time Bomb: Organisations must rebuild a culture that ensures everyone has a security-first mindset, wherever they’re working.

2023-06-27

Canada Challenges Meta Over Access To News

Meta has announced it will shut down access to news on Facebook and Instagram in Canada in a dispute over payment to local sources.

2023-06-26

US Pension Fund Hit By MoveIT Vulnerability

The California Public Employees’ Retirement System - the biggest public pension fund in the US - is the latest victim of ClOP ransom attackers.

2023-08-10

Twenty Million Scam Emails Reported In Britain

Almost 21 million reports have been made to the Suspicious Email Reporting Service . resulting in the removal of over 235,000 malicious websites.

2023-06-29

British Universities Vulnerable To Credentials Fraud

Two Million Breached Credentials: British universities are at high risk of cyber security breaches caused by attacks launched using stolen identities.

2023-08-07

Email Impersonation Attacks Reach All-Time High

Email impersonation comprises over 90% of threats observed in corporate inboxes and almost all of those are credentials-based theft attacks.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

Group-IB

Group-IB

Group-IB is a leading provider of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigating high-tech crimes, and protecting intellectual property.

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

Cybercrowd

Cybercrowd

Cybercrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

Egis Technology

Egis Technology

Egis specializes in the IC design, research and development, and the testing and sales of capacitive fingerprint sensor.

Cyber Affairs

Cyber Affairs

Cyber Affairs is the first Italian press agency entirely dedicated to cyber security.

Cyber Security Specialists

Cyber Security Specialists

Cyber Security Specialists Limited provide Security services across a wide range of markets, from multi-national Corporate Organisations and Government Agencies, through to smaller Businesses.

Steganos

Steganos

Steganos offers highly secure and easy to use software tools that protect and secure on and offline data.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

RIA in a Box

RIA in a Box

MyRIACompliance combines our team of RIA compliance experts with an online software platform to help investment advisers better manage regulatory compliance and cybersecurity responsibilities.

Cyber Security Operations Consulting (CyberSecOp)

Cyber Security Operations Consulting (CyberSecOp)

CyberSecOp is an ISO 27001 Certified Organization which provides cyber security operations services and risk management consulting.

National Cryptologic Foundation (NCF) - USA

National Cryptologic Foundation (NCF) - USA

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

ShellBoxes

ShellBoxes

ShellBoxes are a leading Web3 company focused on providing top-notch blockchain security and development services.

Ethnos Cyber

Ethnos Cyber

Ethnos Cyber is Africa’s leading cybersecurity and compliance management company. We provide Information Security, Risk Management, Cybersecurity and Compliance Management solutions to clients.

Metrics that Matter (MTM)

Metrics that Matter (MTM)

Metrics that Matter redefines how organizations approach cybersecurity by offering unprecedented insight into the value of their assets to criminals and tailored action plans to protect.