News

2023-03-03

Digital ID Cards For Everyone In Britain

Sir Tony Blair and Lord Hague are recommending adoption of universal ID cards in an effort to use technology to transform the British economy.

2023-03-02

An Apocalyptic Cyber Event

Warning: The World Economic Forum Global Security Outlook Report 2023 predicts a “catastrophic cyber event" is on the way in the "near future".

2023-03-01

Calculating The Ransom Demand On The Victim’s Insurance

Informed Extortion: The ransomware group HardBit offers to set its ransom demands in relation to the victim organisation's insurance cover.

2023-02-28

Hackers Have Stolen GoDaddy's Source Code

GoDaddy has revealed that hackers gained access to its servers to install malware, with the potential to extort many of its hosting customers.

2023-03-10

Artificial Intelligence Today - How AI Works

Artificial Intelligence is becoming the main component of important emerging technologies like Big Data, Robotics and the Internet of Things.

2023-02-27

Australia’s Victoria Leads On National Cyber Strategy

Centre Of Excellence: Victoria is Australia’s leading cyber security hub, with a thriving tech base that is developing global security solutions.

2023-02-27

Start Thinking Like A Hacker

Curiosity Aggression & Persistence: To get inside the mind of a hacker, you need to think like a hacker and this is known as "white hat" hacking.

2023-02-27

Securing Hybrid Workplaces

Network Access: More organisations are working on streamlining their operations by connecting physical and digital security systems.

2023-02-27

Half Of British SMEs Have Been Attacked

Cyber criminals have identified SMEs as vulnerable because of new working practices, small IT teams and a lack of solutions knowledge. 

2023-02-23

Scandinavian Airline App Compromised

Don't Use The SAS App: Users risk being logged into the wrong account and having access to the personal details of other people.

2023-02-25

Digital Platform Regulation - Impossible?

Governing The Ungovernable: Digital platforms are the last fortress for democratic and participatory civic engagement. By Yasmin Afina

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

Rollbar

Rollbar

Rollbar is a full-stack error monitoring platform for web and mobile applications. We help developers find and fix bugs fast. Built by developers for developers.

Secure India

Secure India

Secure India provides Forensic Solutions that help Government and Business in dealing with prevention and resolution of Cyber related threats.

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

Cyberwatch

Cyberwatch

Cyberwatch is a Vulnerability Scanner & Fixer software that helps you to detect and fix the vulnerabilities of your Information System.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

Tier One Technology Partners

Tier One Technology Partners

Tier One Technology Partners is an IT managed services provider that focuses on cybersecurity, cloud services, IT consulting, and infrastructure.

Pelion IoT

Pelion IoT

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

Protected Media

Protected Media

Protected Media’s advanced cybersecurity ad fraud solution guards you against current and emerging threats across Connected TV, Display and Video advertising.

Axitea

Axitea

Axitea designs, implements and develops the solutions best suited to its customers’ needs and their physical and cyber security requirements.

Moore ClearComm

Moore ClearComm

Moore ClearComm is part of Moore Kingston Smith a leading UK firm of accountants and business advisers. Our services include Data Privacy, Cyber Security, Business Continuity and Information Security.

Mediatech

Mediatech

Mediatech, specialized in managed Cybersecurity and Cloud services, a single point of contact for your company's IT and infrastructure.

GAM Tech

GAM Tech

GAM Tech is a Managed IT Service Provider that serves small and medium sized businesses in Alberta, British Columbia, Ontario and Quebec.

Two Candlesticks

Two Candlesticks

Two Candlesticks is a global cybersecurity service provider delivering high level consultancy, strategy, and frameworks to governments, regulators and midsized companies.