News

2022-11-28

Hidden In Plain Sight

Control system cyber incidents are more numerous & damaging than you might expect - more than 17 million resulting in 34,000 deaths. By Joe Weiss

2022-11-25

Five Ways Executives Can Optimize Cyber Security Spending

The Right Tools & People: Just pouring money into cyber security does not automatically result in increased preparedness. By Lee Rossey

2022-11-25

Navigating The Evolving Threat Landscape

Top Two Priorities: Organizations must adopt a culture of becoming operationally resilient to survive the evolving threat landscape. By Tom Goodwin

2022-11-25

Shifting Left In Enterprise Cloud Security

Speed Versus Safety: Companies need to invest in preventative measures to safeguard their cloud estates against cyber attacks. By Stuart Green

2022-11-23

Simplicity In Complexity: The Key to Successful Threat Exposure Management

Continuous Threat Exposure Management: CTEM is the key that unlocks the convoluted situation of threat handling, bringing order to chaos.

2022-11-23

How to Combat Common Information & Collaboration Security Threats

Cyber Security Enables Business: Every single business is a target and attacks are only going to become more subtle & more frequent. By Onur Özen

2022-12-02

Cyber Security Predictions For 2023

Hackers will work together, specializing their skills to deliver ransomware to target sectors & victims, making insurance a priority. By Andy Harris

2022-12-14

Ensure Your Organisation’s Staff Has Cyber Security Awareness For 2023

Get Ready: 2023 is fast approaching and phishing and cyber attack campaigns continue to increase. It's time to train your people in cyber security.

2022-11-28

Twitter's Blue Tick Used To Promote Fake Accounts

Verified Fake: Twitter released its Blue paid service only to find that some users immediately began exploiting the new tool for malicious purposes.

2022-11-26

Outsourcing IT Systems & Data Management Can Be A False Economy

Risky Business: In the connected world organisations increasingly rely on outside providers to fulfill their cyber and IT supply chain needs.

2022-12-06

Smartphones Are More Vulnerable Than You Think

Ghost Touch: Most mobile phone users of all ages have a smartphone, although few are aware quite how vulnerable these devices are to attacks.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CIRCL

CIRCL

CIRCL is the national Computer Incident Response Center of Luxembourg

Proofpoint

Proofpoint

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

Exostar

Exostar

Exostar is the cloud platform of choice for secure enterprise and supply chain collaboration solutions and identity and access management expertise.

Lacework

Lacework

Lacework brings speed, scale, and automation to cloud security and allows security and DevOps teams to collaborate on keeping data and applications safe.

TokenOne

TokenOne

TokenOne is a Cyber Security software company that makes it easy to replace passwords, tokens and other forms of authentication with a more secure solution.

Cryptovision

Cryptovision

Cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and solutions for secure electronic identities.

ECOMPLY

ECOMPLY

ECOMPLY is an all-in-one GDPR Compliance Solution. Efficient data protection management system for businesses and DPOsomply.

Crayonic

Crayonic

Crayonic digital identity technologies protect and guarantee the identity of people and things.

BELAC

BELAC

BELAC is the national accreditation body for Belgium.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

Accelerator Frankfurt

Accelerator Frankfurt

Accelerator Frankfurt is an independent go-to-market program focused on Fintech, Cybersecurity and Digital B2B startups.

ANSSI Burkina Faso

ANSSI Burkina Faso

ANSSI is responsible for managing the security of information systems and cyberspace in Burkina Faso.

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.

SysGroup

SysGroup

SysGroup is an award-winning managed IT services, cloud hosting, and IT consultancy provider.

ThreatMon

ThreatMon

Gain insights into emerging threats with real-time data and AI-driven analysis to stay ahead of cyber risks. Detect, analyze, and respond to threats before they happen.