News

2023-08-08

Only Half Of Citizens Are Happy With Digital Public Services

People are used to the convenience of e-commerce interactions and expect the same service levels in their interactions with government.

2023-06-27

USA & Europe Undergoing A Wave Of Cyber Attacks

ClOP: Russia has launched a stream of hacking exploits targeting European and numerous US government agencies & other organisations.

2023-06-26

Don't Use ChatGPT At Work

Endangering The Organisation: There are numerous potential hazards for staff & employers connected with using ChatGPT in the workplace.

2023-06-26

Why Are Businesses Ignoring Incident Response?

Not having an Incident Response Plan can be a significant factor in how much impact an attack has and how long it takes to recover. By Phil Robinson

2023-06-22

Progress Software Has Critical Hacking Vulnerabilities

MOVEit: CISA has identified that another software product has been exploited to breach multiple US federal agencies by “unattributed APT actors”.

2023-06-22

What Is The Cybersecurity Maturity Model Certification (CMMC)?

CMMC certification can give your business a competitive edge in the defense contracting marketplace as well as help safeguard national security.

2023-06-21

Maritime Cyber Attacks Are A Deadly Threat

Collisions, Deaths & Disruption: Maritime cyber security needs more investment, better regulation and widespread sharing of threat intelligence.

2023-06-21

Data Sovereignty

Cyber security is not just about IT, it is about data governance and the responsibility for that rests firmly with management. By Simon Pamplin

2023-06-20

Improving Data Security To Ensure Cybersecurity Compliance

NIS 2 Directive: Companies affected by the new directive need to demonstrate the highest levels of cybersecurity compliance. By John Michael

2023-06-20

Manufacturers Are Today's Top Target For Cyber Crime 

Security By Default: Manufacturing products & services need to implement layers of resilience to their different types of threat. By Andy Dunn

2023-06-20

Shuckworm Intensifies Cyber Attacks On Ukraine

Shuckworm is thought to be linked to the Russian FSB and has increased cyber attacks on Ukraine, hacking military & security intelligence. 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CERT.BY

CERT.BY

The National Computer Emergency Response Team of the Republic of Belarus.

Resec Technologies

Resec Technologies

Resec provides total protection against all types of known and unknown malware threats including viruses, Trojans, ransomware and phishing, regardless of their delivery method.

Monster Jobs

Monster Jobs

Monster is a global leader in connecting people to jobs, wherever they are. Monster covers all job sectors including cybersecurity in locations around the world.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

Internetwork Defense (IND)

Internetwork Defense (IND)

Internetwork Defense is a premier provider of Information Security Training and Business Consulting Services in the Mid-Atlantic region.

Newtec Services

Newtec Services

IT should be responsive, adaptive, and smart. Now more than ever, you need a business that runs efficiently and can adapt to today's challenges. We can help with custom IT solutions.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

Wavex Technology

Wavex Technology

Wavex Technology is an award winning IT Services firm offering clients a secure and fully managed IT service.

CYSIAM

CYSIAM

CYSIAM provides world-leading expertise in offensive security and critical incident response. We train our clients to be able to protect themselves and respond to attacks and breaches when they occur.

Artifice Security

Artifice Security

Artifice Security will demonstrate real-world attacks on your network, web applications, infrastructure, and personnel to expose your hidden security risks.

Randaemon

Randaemon

RANDAEMON’s mission is to create True Random Number Generators (TRNG) that are hardware-based and integrated into System-on-Chip.

Helix Security Services

Helix Security Services

Helix Security provides IT & information security consultancy to government and businesses across New Zealand.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.

Early Game Ventures (EGV)

Early Game Ventures (EGV)

Early Game Ventures invests in startups that jumpstart new industries in the emerging markets of Europe.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.