News

2024-04-18

Penetration Testing Explained

A Penetration Test (Pen Test) is an authorised simulated attack performed on a computer system to evaluate its security, with authorised permission.

2024-04-18

Problems With Underperforming Cyber Security Service Providers 

The Risks Of Reliance On Service Providers: It is increasingly hard for companies to disconnect from the digitised supply chain ecosystem.

2024-04-18

Who Is Legally Responsible For Your Cybersecurity?

Balance Point: Users and providers must work together to create a clear understanding of risk, consent & responsibility. By Mark Cunningham-Dickie

2024-04-17

Iranian Hackers Targeted Israel’s Radar Systems

An Iranian hacking group named Handala has published a statement on social networks, claiming that they penetrated Israel's radar defences.

2024-04-24

Cyber Threats To British Elections

Election Year: British voters are facing a significant increase in nation-state hacking activities, fake news and disinformation in 2024.

2024-04-29

Controlling The Use Of Cyber Weapons

Cyber Arms Control: Rapid technological progress, a lack of political will & uniform definitions are contributing to the risks of cyber warfare.

2024-04-15

Iranian Hackers Attack US Water Supplies

The White House says recent attacks by Iranian hackers on US water infrastructure are a loud wake-up call to the water & utilities industries.

2024-04-22

British Businesses Must Do More To Protect Themselves

British businesses - especially small ones - are responding poorly to the challenge of preventing, detecting or responding to data breaches.

2024-04-17

Hackers Using YouTube To Deliver Malware

Malicious User Accounts: Data stealing malware is being delivered via YouTube disguised as pirated software and video game cracks.

2024-04-19

Large Language Models Are An Inflection Point For Cyber Security

The LLM Step Change: A technology event comparable to the invention of the Internet, driving a $multi‐billion race to dominate this market.

2024-04-15

DoS Attacks That Can Crash Web Servers With Ease

HTTP/2 Continuation Flood: A new DoS attack method poses a severe threat by sending a sequence of CONTINUATION frames without END_HEADERS.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Qualitest Group

Qualitest Group

Qualitest is the world’s largest pure play Quality Assurance and software testing company.

Hack in the Box Security Conference (HitBSecConf)

Hack in the Box Security Conference (HitBSecConf)

HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events feature two days of training and a two-day multi-track conference

Capita

Capita

Capita is a consulting, digital services and software business, providing end-to-end enterprise IT services and solutions focused around digital transformation and innovation.

ISC2

ISC2

ISC2 is an international, non-profit membership association for information security leaders. Our information security certifications are recognized as the global standard for excellence.

ITonlinelearning

ITonlinelearning

ITonlinelearning specialises in providing professional certification courses to help aspiring and seasoned IT professionals develop their careers.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Inflexor Ventures

Inflexor Ventures

Inflexor Ventures is a technology focused venture capital firm that invests in early stage companies from seed to Series-A+ stages.

CyberArmor

CyberArmor

Cyber Armor defend everyday IT and OT systems, from government agencies to critical infrastructure, from system integrators to small industries.

Anametric

Anametric

Anametric is developing new technologies and devices for chip scale quantum photonics, with a focus on cybersecurity.

Metmox

Metmox

Metmox mission is to be trusted advisor and partner to protect our customer’s evolving Cloud, Network, Application, IT infrastructure and cybersecurity needs.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

Blue Bastion

Blue Bastion

Don’t give cybercriminals the chance to find weaknesses in your company’s cyber security system. Defend your institution from all attacks from all directions with Blue Bastion.

WireGuard

WireGuard

WireGuard is a communication protocol and free and open-source software that implements encrypted virtual private networks (VPNs).

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.

ABPGroup

ABPGroup

ABPGroup is Asia’s leading cybersecurity technology provider focusing on providing best-of-breed solutions that address today’s pressing challenges.

Price Forbes

Price Forbes

Building on more than 100 years of specialist insurance broking, Price Forbes partner with clients around the world who are looking to understand and balance today’s risk and plan for the future.