News

2022-11-16

The Internet Of "vulnerable" Things?

Being Smart And Being Secure Are Not Always The Same: How can we be both hyperconnected and secure? By Sarah Daun & Caroline Churchill 

2022-11-15

Privileged & Protected - Managing Access At The Endpoint

Endpoint Sprawl: Clamping down on privileged administrator rights is vitally important to strengthening security posture. By Andy Harris

2022-11-28

How Poor Password Hygiene Could Unravel Your Business

What you need to know about password theft and how organizations can strengthen their password security protocols. By Muhammad Yahya Patel

2022-11-15

Guilty: A Criminal Conviction For One CISO Has Consequence For Others

Doing The Right Thing: Uber’s ex-security chief has been found guilty in a US court - what does that mean for CISOs in the UK? By Nigel Jones

2022-11-14

International Fraud Awareness Week: Every Individual Has A Part to Play

International Fraud Week: As we come into a busy shopping period the cyber experts at McAfee urge consumers to re-evaluate their online habits.

2022-11-14

Why Are Businesses Still Falling Victim To Ransomware?

Industry expert and ex-FBI cyber crime Special Agent Jason Manar, now CISO at Kaseya, answers the key questions for business leaders.

2022-11-10

CISA Reports No Significant Attacks On US Elections

Early warnings were heeded by the local government agencies responsible for running the elections and no significant harm has been identified. 

2022-11-09

The Reality Check For Small & Medium Businesses

Ransomware: Few small & medium sized businesses realize they are just as much at risk as much larger enterprises. By Muhammad Yahya Patel

2022-11-08

Ukraine Uses Artificial Intelligence To Speed Up Attacks

Ukrainian soldiers are successfully applying advanced AI tools to publicly available data, enabling them to produce rapidly actionable information.

2022-11-08

Medibank Won’t Pay Ransom

Critical Health Insurance Data: 9.7 million current and former customer names, dates of birth, phone numbers and email addresses stolen.

2022-11-07

Australia’s Government Hit By Another Cyber Attack

Stolen Data: A supply chain attack that struck technology services providers to government departments is the latest in a sustained campaign.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Canadian Centre for Cyber Security (CCCS)

Canadian Centre for Cyber Security (CCCS)

The Cyber Centre is the single unified source of expert advice, guidance, services and support on cyber security for government, critical infrastructure, the private sector and the public.

Prim'X Technologies

Prim'X Technologies

Prim'X Technologies provides information protection solutions to prevent unauthorised access to sensitive data.

RIGCERT

RIGCERT

RIGCERT provides training, audit and certification services for multiple fields including Information Security.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

OWN

OWN

OWN (formerly SEKOIA) is a major French player in cybersecurity providing tailor-made, informed and adapted cyber support thanks to its DNA of passionate and committed experts.

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.

PlexTrac

PlexTrac

PlexTrac is a cybersecurity reporting and workflow management platform that supercharges security programs, making them more effective, efficient, and proactive.

Infiot

Infiot

Infiot is a pioneer in enabling secure, reliable access with zero trust security, network optimization, edge-intelligence and AI driven operations for all remote users, devices, sites and cloud.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

Topsec Cloud Solutions

Topsec Cloud Solutions

The Topsec Managed Email Security Platform eliminates Spam, Viruses, Malware, and Phishing.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Bluewave

Bluewave

Bluewave are a strategic IT advisory company that offers businesses a simple and comprehensive way to purchase information technology solutions.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions (ComUnity, secure and encrypted messaging, detection of interception tools, etc) and cyber defense consultancy service.

Fletch

Fletch

Fletch’s AI tracks the evolving cybersecurity threat landscape by reading and interpreting every threat article every day and matching those threats to a company’s exposure.

DART Consulting & Training

DART Consulting & Training

DART is a leading cyber training and consultancy company. We enhance our clients’ cyber capabilities by growing and strengthening their frontline defense – the cyber teams.