News

2023-09-12

Cyber Revolution - Deep & Dark Web [extract]

The Deep Web is at least 400 to 500 times bigger than the surface Web and there's another murkier side to it, known as the Dark Web.

2022-09-12

Cyber Crime Against Individuals [extract]

It's Personal: Cyber crime continues to rise in scale and complexity, affecting essential services & businesses, as well as many private individuals.

2023-11-30

Cyber Security Trends For 2024 [extract]

Cybercrime is predicted to cost the global economy $8 trillion USD in 2023. By the end of 2024 the anticipated cost will be $10.5 trillion.

2024-08-07

Google’s Online Search Dominance Is Ruled Illegal

Online Search Monopoly: US Federal court rules that payments to make Google the default search engine on other browsers broke antitrust rules.

2024-08-07

KnowBe4 Duped Into Hiring A North Korean Hacker

Laptop Mule Farm Espionage: North Korean threat actors attempt to penetrate US organisations by posing as remote IT workers. 

2024-06-20

Artificial Intelligence Is Changing Education [extract]

The widespread introduction of  AI has taken only a few months for Generative AI and ChatGPT to change education.

2024-01-22

Open Banking, Security, APIs & Mobile Apps [extract]

Open banking aims to improve transparency and drive the development of better financial products & services. But are users' sensitive data secure?

2024-02-24

Defending Against These Common Types Of Cyber Attack [extract]

Cyber crime will cost the global economy approximately $10.5 trillion annually by 2025. What, then, are the most common types of cyber attack?

2024-04-15

A Brief Introduction To Quantum Computing [extract]

Quantum Computing: Innovative technology is enabling individuals and companies to solve computational problems previously considered intractable.

2024-04-18

Problems With Underperforming Cyber Security Service Providers [extract]

The Risks Of Reliance On Service Providers: It is increasingly hard for companies to disconnect from the digitised supply chain ecosystem.

2024-08-06

Google Says Websites Must Comply With New Security Rules

Google has lost confidence in Entrust and will soon no longer accept Digital Certificates from one of the most widely used certification authorities.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Deutsche Cyber-Sicherheitsorganisation (DCSO)

Deutsche Cyber-Sicherheitsorganisation (DCSO)

DCSO was founded in 2015 with the aim of counteracting the threats posed by globally organized cybercrime and state-controlled industrial espionage.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

Sayata Labs

Sayata Labs

Sayata delivers a streamlined solution for processing cyber policies. Increase profitability with an easy and intuitive platform.

Cyber Ireland

Cyber Ireland

Cyber Ireland brings together Industry, Academia and Government to represent the needs of the Cyber Security Ecosystem in Ireland.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

BridgingMinds Network

BridgingMinds Network

BridgingMinds Network is an industry leading best practices and IT security training provider in Singapore.

Xopero Software

Xopero Software

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data.

Vala Secure

Vala Secure

Vala Secure is a cybersecurity and compliance consultancy that always stays ahead of regulations, future threats and ever-changing security environments.

Tech Seven Partners

Tech Seven Partners

At TechSeven Partners, we provide a full suite of cyber security solutions for your business including network monitoring, onsite and cloud backup solutions, HIPAA or PCI compliance.

Scybers

Scybers

Scybers are a global cybersecurity advisory and managed services company. With our deep expertise, we help our clients reduce their cyber risks with confidence.

Acronis

Acronis

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.

Defence Innovation Accelerator for the North Atlantic (DIANA)

Defence Innovation Accelerator for the North Atlantic (DIANA)

The NATO DIANA accelerator programme is designed to equip businesses with the skills and knowledge to navigate the world of deep tech, dual-use innovation.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.

Custocy

Custocy

Custocy is a unique collaborative AI technology that identifies sophisticated and unknown (zero-day) attacks.

FSP

FSP

FSP is a leading consultancy specialising in Digital, Security and AI solutions. We navigate the complexities of data sensitivity, confidentiality, governance and compliance.