News

2024-10-15

Data Centres Given Critical National Infrastructure Status In Britain

The UK government wants to promote resilience & security of data centres, What does this mean for data centre providers? By Varney & McCarron

2024-09-24

Remote Pager Attack Begins A New Era Of Warfare

Lethal explosive devices precisely targeted members of Hezbollah, an anti-Israel military organization, controlled by the government of Iran.

2024-10-01

Six Steps On The Road To NIS2 Compliance

NIS2 is the EU’s stringent new cybersecurity Directive and member states have until 17th October to ratify it into national law. By Martin Davies

2024-09-17

Try These Virtual Private Network Alternatives Yourself Now 

Centralized VPNs are a valid solution for web security, although they have been known to leak user data. What are the alternative solutions?

2024-10-01

Cristiano Ronaldo Has A Billion Social Media Followers

The 1 billion figure comprises the total number of his followers on Instagram, Facebook, Twitter, YouTube plus the Chinese platforms Weibo & Kuaishou.

2024-10-01

Meta To Use Facebook & Instagram Posts To Develop AI Tools

Illegal In The EU: Meta is given conditional permission to use anonymized posts from British Facebook & Instagram users to train AI models.

2024-10-01

US Healthcare Provider Fails To Protect Customer Data

Fully 9 months after it was first detected has the extent of a breach, which exposed personal data of 400,000 customers, now been disclosed.

2024-09-22

EC-Council Unleashes AI-Powered Ethical Hackers On Cybercrime

EC-Council: CEH v13 certification equips cybersecurity professionals with essential AI skills & knowledge to prepare them for new era of cybercrime.

2024-10-02

Google’s EU Antitrust Case Dropped

Market Dominance: Google has won its challenge against a €1.49bn fine from the EU for blocking rival online search advertisers.

2024-10-02

Medusa Ransomware Group: Delivering Sophisticated Attacks

The Medusa cyber crime group has found a critical vulnerability in FortiClient EMS software to launch sophisticated ransomware attacks.

2024-10-02

Improving Threat Intelligence Sharing

The disconnect between teams & siloed use of security tools presents a significant risk to successful delivery of threat intelligence. By Dan Bridges

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

Bromium

Bromium

Bromium deliver a new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

National Cyber Security Centre (CNCS) - Portugal

National Cyber Security Centre (CNCS) - Portugal

CNCS is the operational coordinator and Portuguese national authority in cybersecurity working with State entities, and digital service providers

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

DataDome

DataDome

DataDome offers real-time AI protection against all OWASP automated threats, including credential stuffing, layer 7 DDoS attacks, SQL injection & intensive scraping.

SecuLetter

SecuLetter

SecuLetter is able to detect unknown attacks with hybrid approaches, static and dynamic analysis.

Griffeshield

Griffeshield

Griffeshield is a company specialised in new information technologies used to protect Intellectual Property.

Qmulos

Qmulos

Qmulos’ real-time continuous monitoring risk management suite, Q-Compliance, provides a massively flexible and scalable solution to optimizing operational security.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

WolfSSL

WolfSSL

wolfSSL is an embedded SSL/TLS library providing secure communication for IoT, smart grid, connected home, routers, applications, games, phones, and more.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

HACKNER Security Intelligence

HACKNER Security Intelligence

HACKNER Security Intelligence is an independent security consultancy delivering comprehensive security assessments across IT security, physical security, and social engineering.

Buzz Cybersecurity

Buzz Cybersecurity

Buzz Cybersecurity systems and services are designed to proactively guard against common and uncommon cyber threats.

Keeran Networks

Keeran Networks

Established in Edmonton in 1999, Keeran specializes in delivering comprehensive IT support and solutions aimed at optimizing technology investments for businesses.

ZehnTek

ZehnTek

ZehnTek is a premier technology solutions provider, committed to offering comprehensive IT services tailored to meet the diverse needs of businesses.