News

2024-03-20

The US Military Wants New AI Chips

Smarter, Faster & More Powerful: The Pentagon has partnered with Princeton University to develop advanced microchips for Artificial Intelligence.

2024-04-15

A Brief Introduction To Quantum Computing

Quantum Computing: Innovative technology is enabling individuals and companies to solve computational problems previously considered intractable.

2024-03-16

US House Passes Bill That Could Ban TikTok Nationwide

The US Government’s House of Representatives has recently passed a bill that could lead to a nationwide ban on TikTok.

2024-03-14

French Government Suffers Severe Cyber Attacks

Several French government departments fall victim to a series of cyber attacks of “unprecedented intensity”.

2024-03-14

US CISA Breached by Hackers

Hackers breached the systems run by the US Cybersecurity & Infrastructure Security Agency in February by hackers using bugs in Ivanti products.

2024-03-11

2024 & Beyond: Top Six Cloud Security Trends:

Webinar: April 4, 2024 | 11:00 AM PT: Join this webinar to find out about six emerging trends dominating the cloud cybersecurity landscape.

2024-03-20

AI As A Standalone Cybersecurity Solution 

Relying solely on AI tools and removing the human element risks facing adversaries that outpace the machine's capabilities. By Chris Stouff

2024-03-07

A Deep Dive Into Deepfakes & The Threat To Digital Identity Verification

Understanding the complexities of deepfake mechanics and their effects will help minimize the risks & boost the security of identity verification.

2024-03-15

The Cyber Skills Gap & How We Act For The Future

Never Too Late: Digital transformation is running far ahead of the available skills to protect data and prevent cyber crime. By Charles White

2024-03-19

Insights From An Early Adopter Of Microsoft 365 Copilot

Navigating The Future: Microsoft 365 Copilot is not just another button to use within Word or Outlook; it’s an entirely new way of working. By Scott Dodds

2024-03-05

Identifying OSS Security Risks To Safeguard Software Supply Chains

Securing Code: Safeguarding the software supply chain is a shared responsibility for developers, administrators & organisations. By Ax Sharma

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Ixia

Ixia

Ixia provides testing, visibility, and security solutions to strengthen applications across physical and virtual networks.

ControlScan

ControlScan

ControlScan is a Managed Security Services Provider (MSSP) - our primary focus is protecting your business and securing your sensitive data.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

CryptoCodex

CryptoCodex

Cryptocodex has developed Counter-Fight, the most advanced, yet simple to implement, counterfeit detection system.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

Balbix

Balbix

Balbix BreachControl™ is the industry’s first system to leverage specialized AI to provide comprehensive and continuous predictive assessment of breach risk.

Intrinium

Intrinium

Intrinium is an Information Technology and Security Solutions company, providing comprehensive consulting and managed services to businesses of all sizes.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

CYOSS

CYOSS

CYOSS, an ESG Group company, is a specialist in Cyber Security and Data Analytics. We focus on the opportunities of a networked world and make security risks manageable.

Nomios

Nomios

Nomios develops innovative solutions for your security and network challenges. We design, secure and manage your digital infrastructure.

Focus on Security

Focus on Security

Focus on Security are Cyber Security recruitment specialists. We’re dedicated to connecting you with the top Cyber Security talent across the globe. We focus on partnerships and results.

Exium

Exium

At Exium we’ve integrated networking and security in a cloud-delivered Zero Trust platform powered by 5G and open source.

Sage IT

Sage IT

Sage IT offer a wide range of professional and consulting services to help organizations overcome the challenges of today's ever-changing business environment.

TriVigil

TriVigil

TriVigil offer a full-service, comprehensive cybersecurity approach specifically tailored to meet the unique needs of educational institutions.

S4E (Security for Everyone)

S4E (Security for Everyone)

At S4E.io, our mission is to democratize digital security, making it accessible, simple, and effective for individuals and businesses of all sizes.