News

2022-10-04

Lapsus$ Hit Uber

Lapsus$ has claimed responsibility for an attack that forced Uber to close one of its software and messaging systems and stole contractor data.

2022-10-18

Network Security Recommendations Tailored To Your Business

Byos Network Security Maturity Assessment: A free tool that enables companies to rapidly evaluate the strength of their cyber security strategy.   

2022-10-19

Making Cyber Attack Detection Easier With Artificial Intelligence

New AI software tools enable collection of electricity usage data from network devices to detect fluctuations and swiftly identify and stop attacks.

2022-10-14

Legacy Technology is Undermining How Business Responds To Ransomware

Obsolete: Half of UK organisations surveyed depend on outdated, legacy backup and recovery infrastructure to manage & protect their data.

2022-10-19

Spell-Checking In Google Chrome & Microsoft Edge Browsers Leak Passwords

Spell-jacking: A security flaw in browsers can expose corporate users' Login ID credentials to internal assets like databases & cloud infrastructure.

2022-10-14

Microsoft Teams Is Vulnerable To GIFShell Attacks

GIFShell: A new attack technique allows threat actors to exploit Microsoft Teams for phishing attacks and remote data theft using image files.

2022-10-18

Security Patching As A Service

Aunalytics launches its Security Patching Platform, Co-managed Patching As A Service to complement their Advanced Security solution suite.

2022-10-17

Developing Nations Face The Biggest Cyber Security Challenges

Digital Connectivity: The openness of the Internet requires all nations to have effective cyber security policies to have a safe, secure Internet.

2022-10-11

Average Cost Of A Cyber Attack Increases By 80%

Cyber threats are the dominant risk for US businesses with the median cost of a cyber attack costing $18,000, up from $10,000 last year. 

2022-10-02

October Is Cyber Security Awareness Month

October: US Cybersecurity Awareness Month aims to raise awareness of cyber security risks and help people & businesses to protect their data.

2022-10-10

How Police Officers Are Tackling The Data Backlog With Digital Forensics

Collaborative Tools: Police forces struggle with unprecedented volumes of data & digital forensics processes need modernizing. By Harsh Behl

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CCN-CERT

CCN-CERT

CCN-CERT is the Spanish national government computer security incident response centre.

CERT.hr

CERT.hr

CERT.hr is the national authority competent for prevention and protection from computer threats to public information systems in the Republic of Croatia.

Praetorian

Praetorian

Praetorian is an offensive cybersecurity company whose mission is to prevent breaches before they occur.

Insta Group

Insta Group

Insta are a trusted cyber security partner for security-critical companies and organizations.

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

Egis Technology

Egis Technology

Egis specializes in the IC design, research and development, and the testing and sales of capacitive fingerprint sensor.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

Thoma Bravo

Thoma Bravo

Thoma Bravo is a leading private equity firm with a 40+ year history and a focus on investing in software and technology companies.

SECUINFRA

SECUINFRA

SECUINFRA has been supporting companies in detecting, analyzing and defending against cyber attacks since 2010.

Allstate Identity Protection

Allstate Identity Protection

Allstate make it easy to provide complete identity protection, so everyone can live more confidently online.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

SEALSQ

SEALSQ

For the last 25 years, SEALSQ have been developing secure semiconductor chips, secure embedded firmware, and tested hardware provisioning services to serve the vision of a safer connected world.

BlazeGuard

BlazeGuard

At BlazeGuard, we understand that navigating the complex world of cybersecurity can be challenging. That’s why we make it our mission to simplify the process for you.

GovSky

GovSky

GovSky streamlines CMMC compliance, saving time and significantly reducing cost.

CompassMSP

CompassMSP

CompassMSP deliver Managed IT and cybersecurity solutions designed to unleash your business's full potential.

Assurestor

Assurestor

Assurestor's singular focus is delivering leading cloud-based backup and disaster recovery designed to increase levels of IT resilience.