News

2023-01-11

2023 - Threat Intelligence Predictions

EIQ's Intelligence Team: Extortion will evolve, cyber criminals will take sides in Ukraine, Russia's cyberwar will fail and ChatGPT will take off.

2023-01-11

Crypto Currency: From Bitcoin to Blockchain

Everyone Understands Crypto Currency - Or Do They? As the market dives, everything you need to know about crypto, but were afraid to ask.

2023-01-10

Zero Trust In (remote) Access

Caution Is Better Than Indulgence: Zero trust offers small companies a level of security equivalent to that of large enterprises. By Paddy Srinivasan

2023-01-10

Chinese Spy Device Found Hidden In British Government Car

Concerns over the covert use of Chinese spyware prompted intelligence operatives to investigate British government & diplomatic vehicles.

2023-01-10

Five Data Security Trends Organisations Must Deal With

In 2023 business challenges of all kinds are growing more difficult to identify and solve. Data protection is one of them. By Florian Malecki

2023-01-06

British Spy Chief Says War In Ukraine Is Changing Intelligence Gathering

Cyberwar: Ransomware, phishing and DDoS attacks are just a few of the many weapons that states are now using in geopolitical conflicts.

2023-01-09

Spying On Mobile Phone Calls

EarSpy: Smartphone manufacturers’ efforts to improve audio in their devices has led to new vulnerabilities, including unprotected earspeakers.

2023-01-09

Cybersecurity: Prepare For The Year Ahead

Back-to-Basics: Cybersecurity threats and regulation will evolve in the next year, yet many aspects will remain the same. By Simon Eyre 

2023-01-09

Web Browser Attacks & How To Combat Them

The web browser has become the biggest attack surface available to threat actors, who are actively leveraging and exploiting it. By Jonathan Lee

2023-01-09

Why We Should Worry About A War On Cybercrime

Critical Infrastructure: Cyber attacks are transitioning from being an issue of enterprise security to one of risk to public safety. By Will Dixon

2023-01-06

PAM, IAM, Or Both?

Useful But Different: Identity & Access Management (IAM) and Privileged Access Management (PAM) are not the same thing. By Colin Tankard

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

Copenhagen FinTech

Copenhagen FinTech

Copenhagen FinTech is a centre for R&D and innovation in the Danish finance IT sector. Focus areas include cyber security and payments platforms.

Guy Carpenter

Guy Carpenter

Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics.

Infosec (T)

Infosec (T)

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

iONLINE

iONLINE

iONLINE delivers high quality IT services and solutions to businesses in Azerbaijan.

Cybersecurity Professionals

Cybersecurity Professionals

Search vacancies from top cyber security jobs worldwide on CyberSecurity Professionals. View IT security jobs or upload your CV to be seen by recruiters from industry leading firms.

Insight Partners

Insight Partners

Insight Partners is a leading global private equity and venture capital firm investing in growth-stage technology, software and Internet businesses.

KSOC Labs

KSOC Labs

KSOC is an event-driven SaaS platform built to automatically remediate Kubernetes security risks.

Astrix Security

Astrix Security

Astrix enables security teams to instantly see through the fog of connects and detect redundant, misconfigured and malicious third-party exposure to their critical systems.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.

Windstream

Windstream

Windstream is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the US.

runZero

runZero

runZero delivers the most complete security visibility possible, providing you the ultimate foundation for successfully managing exposures and compliance.

CrashPlan

CrashPlan

CrashPlan provides peace of mind through secure, scalable, and straightforward endpoint data backup.

RealmOne

RealmOne

RealmOne addresses the most challenging issues in the realms of defense and cyberspace, adapting to the continuously changing demands of our national security customers.

Faddom

Faddom

Faddom is an agentless tool that visualizes your on-premises and cloud infrastructure, as well as their inter-dependencies.