News

2024-11-05

Social Media Algorithms & Their Effects [extract]

Algorithms analyse previous behaviour, using past interactions to predict and suggest content that aligns with individual user interests.

2024-11-05

Social Media Algorithms & Their Effects

Algorithms analyse previous behaviour, using past interactions to predict and suggest content that aligns with individual user interests.

2024-11-05

Generating Competitive Advantage Through Compliance

Managing cyber risk is a powerful business enabler, helping businesses to become more efficient and more competitive. By James Eason

2024-11-05

Safeguarding Your Business: 10 Best Practices For Mobile Device Safety

Smartphones, tablets and laptops are essential for communication, data access & collaboration but are equally attractive targets for cyberattacks.

2024-11-04

To Lead In AI, Governments Need To Invest In Large-Scale GPU Clusters

The US government needs to move fast to build new computing infrastructure if it is to keep pace with AI research & the related economic benefits.

2024-10-30

Eight Updated Smartphone Security Hacks For 2025

Your smartphone isn’t just a device - it’s a digital vault. Keeping your mobile device secure is essential but doesn’t need to be complicated.

2024-11-04

The US Has A New AI Strategy 

As the Biden Presidency fades, the White House has issued a comprehensive new plan to harness Artificial Intelligence for national security.

2024-11-04

Russian Hackers Attack British Local Government 

A campaign of attacks on local councils is thought to be one part of Russia’s response to the UK’s growing involvement in the Ukraine war.

2024-10-31

The Developer’s Guide To Preventing Data Leaks & Breaches In Software

With the level of cyber threats so advanced, any weak spots in the code may result in exposed sensitive data & significant financial losses.

2024-11-03

X Is A Vehicle For Political Propaganda

Critics claim the platform is being used to promote politically motivated messages, including conspiracy theories, which are essentially propaganda.

2024-10-29

Google Urges Windows Users To Update Chrome Amid New Security Threats

Urgent Alert: When you keep your software updated it makes you safer online, improves your experience, and protects your important data.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CW Jobs

CW Jobs

CWJobs.co.uk is a leading specialist IT recruitment website covering all areas of IT including Cyber Security.

Opengear

Opengear

Opengear ensures network resilience to enterprises by enabling business continuity with the Network Resilience Platform.

Research Institute in Science of Cyber Security (RISCS)

Research Institute in Science of Cyber Security (RISCS)

RISCS is focused on giving organisations more evidence, to allow them to make better decisions, aiding to the development of cybersecurity as a science.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

CSO GmbH

CSO GmbH

CSO GmbH provide specialist consultancy services in the area of IT security.

MaskTech

MaskTech

MaskTech supplies highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

AAROH

AAROH

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & fraud.

Rentalworks

Rentalworks

Rentalworks is a leading provider of Internet-of-Things (IoT) Asset Lifecycle Management Services including secure data erasure and disposal.

CYBER.ORG

CYBER.ORG

CYBER.ORG's goal is to empower educators as they prepare the next generation to succeed in the cyber workforce of tomorrow.

Bright Data

Bright Data

Bright Data Inc is the world’s #1 web data platform, enabling organizations to research, monitor, analyze data, and make better decisions.

Akamai Technologies

Akamai Technologies

Akamai's leading security, compute, and delivery solutions are helping global companies make life better for billions of people, billions of times a day.

Chainguard

Chainguard

Founded by the industry's leading experts on open source software, security and cloud native development, Chainguard are on a mission to make the software supply chain secure by default.

Ironblocks

Ironblocks

Ironblocks is a pioneering cybersecurity firm that specializes in delivering comprehensive, end-to-end security solutions for the rapidly evolving Web3 ecosystem.

Superna

Superna

Superna is the global leader in data security and cyberstorage solutions for unstructured data, both on-prem and in the hybrid multi-cloud.

Texaport

Texaport

Texaport's vision is to be the trusted partner of choice for organisations seeking comprehensive IT management and cutting-edge security solutions.

Prophet Security

Prophet Security

Prophet Security empowers organizations to triage, investigate, and respond to alerts with unparalleled speed and accuracy.