News

2024-08-19

Resilience As Regulation: Preparing For The Impact Of CER

EU Critical Entities Resilience Directive: Along with NIS2, the CER will change the way organisations think about security. By Andrea Monteleone

2024-08-15

Business Identity Theft: Saving The Digital World From Fake Businesses

Protect Your Business From Identity Theft: Discover how to identify fake businesses and safeguard your digital presence today. By Sophie Martin

2024-08-16

Trump Campaign Emails Hacked

Update: Donald Trump’s election campaign claim that its internal communications have been hacked by the Iranian government looks credible.

2024-08-16

EU Regulators Threaten To Prosecute Elon Musk

Illegal Content: The European Union is heading for a confrontation with Elon Musk following his live interview with Donald Trump on X.

2024-08-14

Coming Soon - An AI Cyber Security Code

AI Cyber Security Code Of Practice: A proposed set of guidelines that could become the standard for AI security in Britain & potentially worldwide.

2024-08-13

Venezuela Blocks Access To X

VPN Surge: Venezuela’s government has restricted access to a range of online services in response to civil unrest over disputed election results.

2024-08-13

Hackers Stealing Data Using Cisco Smart Install

CISA Warning: Hackers are exploiting an obsolete Cisco Smart Install feature to get access to sensitive data using readily available protocols.

2024-08-20

Ransomware Attack Trends & The True Costs To Victims [extract]

Ransomware attacks pose significant risks to businesses worldwide, with cyber criminals employing increasingly sophisticated tactics to extort payments.

2024-08-07

The Role of VPNs In The World Of Cybersecurity

Safeguarding Sensitive Information: VPNs offer a layer of protection which helps users to navigate the Internet with greater security and anonymity.

2024-08-12

British Nuclear Plant Has Serious Cyber Security Failures

Multiple investigations revealed staggering vulnerabilities that exposed the operation to a wide range of potentially devastating cyber attacks.

2024-08-12

Microsegmentation In 2024: Trends, Technologies & Best Practices

Enhanced Security: By segmenting the network, security policies can be enforced at more precise levels, making it harder for threats to propagate.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Montash

Montash

Montash is an award winning, global technology recruitment business, specialising in the acquisitions of high-performing talent across a number of core disciplines including Information Security.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

PSC

PSC

PSC is a leading PCI and PA DSS assessor and Approved Scanning Vendor.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

IoT Defense

IoT Defense

IoT Defense (IOTD) is a cybersecurity and networking company building solutions that enable the protection of networks and the ever-increasing prevalence of IoT devices.

CRI4DATA

CRI4DATA

CRI4DATA's mission is to help organizations build their resilience to cyber risk.

Kymatio

Kymatio

Kymatio are pioneers in Artificial Intelligence applied to adaptive staff strengthening, cultural change and predictive internal risk analysis.

Anitian

Anitian

The Anitian Compliance Automation platform builds, configures, and monitors cloud environments to accelerate compliance for standards such as FedRAMP, PCI, ISO/GDPR and CJIS.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

Innovex Global

Innovex Global

Innovex is a full-service executive search and advisory business that engages with early-stage startups, scale-ups, and established businesses in the Fintech, Cybersecurity and Technology industries.

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

Dryad Global

Dryad Global

Dryad Global offers a comprehensive suite of maritime intelligence solutions, including a best-in-class situational awareness, planning and security system and industry-leading cyber protection tools.

Black Bison Cyber

Black Bison Cyber

Black Bison Cyber is a premier cybersecurity firm specializing in elite, discreet, and highly personalized digital protection for high-profile individuals and executives.