News

2023-03-31

If It’s Convenient Be Suspicious – The Human Aspect

When 21% of breaches occur because of human error, how do CIOs encourage employees to care about security? By Travis Everett

2023-04-05

Law Enforcement Agencies Shut Down Genesis Market

Operation Cookie Monster: One of the largest criminal marketplaces used by online fraudsters has been closed down by law enforcement.

2023-04-06

Phishing Kits: The New Frontier For Hackers

Phishing As A Service: It is no longer the case that a potential cyber criminal needs to have a real technical skillset to launch a phishing attack.

2023-04-05

The Skills Gap Is Increasing Risk & Exposure To Attack

The effects of the skills shortage are apparent, as organisations struggle to recruit sufficient talent & maintain security levels. By Jamal Elmellas

2023-04-05

President Biden Forbids Spyware From Government Use

President Biden has approved an Executive Order that bans US government use of the type of commercial spyware used by foreign states. 

2023-04-04

TikTok Fined £12.7m For Breaching Child Protection Law

The video-sharing site used the data of 1.4 million British children aged under 13 without parental consent, resulting in a punitive fine.

2023-04-04

AI Revolution: The Future Is Here, Now

Artificial intelligence will change our lives, in ways both good and bad. But how confident can we be that we are prepared for what's coming?

2023-04-04

Universities Are Exposing Their Students To Cyber Threats

Universities are lagging on basic cyber security measures, subjecting both students & staff to higher risks of credentials-based email fraud.

2023-04-01

Honeypot Sting Exposes British Cyber Criminals

Operation 'Power Off': Police clamp down on cyber criminals using Distributed Denial of Service tactics to target online businesses & their users.

2023-04-05

New Webinar: Next-generation Firewalls

Learn how a next-generation firewall is key to protecting organizations from evolving challenges. Register Now

2023-04-03

Ransomware: A Security Guide 

More than a third of organisations worldwide suffered an attack in 2022, with ransomware attacks occurring approximately every 11 seconds.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

International School of IT Security (ISITS)

International School of IT Security (ISITS)

The International School of IT Security (ISITS) is a leading provider of professional training in the field of IT Security.

Spanish National Cybersecurity Institute (INCIBE)

Spanish National Cybersecurity Institute (INCIBE)

INCIBE undertakes research, service delivery and coordination for building cybersecurity at the national and international levels.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

Ethoca

Ethoca

Ethoca is a secure network for card issuers and merchants to connect and work cooperatively outside the payment network in a unique and powerful way.

SecuTech Solutions

SecuTech Solutions

SecuTech is a global leader in providing strong authentication and software licensing management solutions.

BlueKrypt

BlueKrypt

BlueKrypt is a consulting firm for the security of IT systems and their management.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

Labs/02

Labs/02

Labs/02 is a seed-stage incubator with a mission to advance cutting-edge technology in innovative areas including AI, deep learning, autonomous transportation, and smart cities.

Astaara

Astaara

Astaara is an integrated insurance services and risk management advisory business incorporating cyber risk advisory, underwriting and analytics.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

ACI Learning

ACI Learning

ACI Learning - Training tomorrow’s industry leaders with formats for all types of learners in Audit, Cybersecurity, and IT.

Castlepoint Systems

Castlepoint Systems

Castlepoint Systems is a pioneer in information governance, risk and compliance as a service. An all-in-one solution offering powerful risk management, built in compliance, cybersecurity and audit.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.

Efex

Efex

Efex is one of Australia’s leading Managed Technology Solutions providers. We service local companies across Australia, providing accessible, fast and straightforward IT.

Conifers.ai

Conifers.ai

Empower your existing SecOps team with the strength of AI - achieve SOC excellence with Conifers CognitiveSOC.