News

2024-03-20

Proliferation Of Fake News On Social Media

Social Media: Fake news & misinformation is the number one risk facing society over the next two years, according to the World Economic Forum.

2024-03-15

Microsoft Going Large On AI & Cloud Computing

Microsoft is making big investments in Europe, with multi-billion-dollar spending plans for the UK & Germany plus a new R&D centre in Spain.

2024-03-19

Cyber Security Governance Is A Leadership Responsibility

The Role of The Board: As cyber threats evolve, business leaders must remain vigilant in cyber security governance says Britain's NCSC.

2024-03-05

Malawi's Passport System Breached

'Technical Glitch': Malawi's government has taken the step of suspending issuing any passports after a breach at the immigration service.

2024-03-12

Wireless Security In Smart Homes Is Vulnerable

Home security devices that connect directly to a domestic WiFi network or a smart home hub can be jammed, rendering remote alarms useless.

2024-03-13

Gender Diversity In The Technology Sector

The Tide is Turning: British organisations are slowly starting to recognise the benefits of employing more women in the technology sector.

2024-03-01

Ransomware: The True Cost To Business

Paying Ransom Does Not Work: Organisations should really focus on detection & prevention tactics before a damaging attack happens.

2024-02-28

Harnessing Predictive Analytics In Cybersecurity

Proactive Cybersecurity: Harnessing the power of predictive analytics in cybersecurity is not an opportunity. It's an imperative. By Alexander Norell

2024-02-28

DMARC Email Validation: Cracking Down On Fraud

Google & Yahoo mail services are introducing changes starting soon that will make your inbox a safer place for both legitimate senders & recipients.

2024-02-26

Data Leak Exposes China’s Hackers For Hire 

Nation-State Hackers Exposed: I-Soon has abilities to breach foreign governments, infiltrate social media accounts & hack personal computers.

2024-02-24

Defending Against These Common Types Of Cyber Attack

Cyber crime will cost the global economy approximately $10.5 trillion annually by 2025. What, then, are the most common types of cyber attack?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

Center for Strategic Cyberspace & International Studies (CSCIS)

Center for Strategic Cyberspace & International Studies (CSCIS)

CSCIS seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

Acalvio Technologies

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.

Thinkst Applied Research

Thinkst Applied Research

Thinkst is an Applied Research company with a deep focus on information security.

HorizonIQ

HorizonIQ

HorizonIQ (formerly Internap Corp / INAP) maximizes efficiency and innovation with flexible infrastructure solutions.

Garland Technology

Garland Technology

Garland Technology specializes in network access points (TAPs) for 100% visibility allowing you to see every bit, byte, and packet flowing through your network.

Greensafe IT

Greensafe IT

Greensafe offer various onsite and offsite data erasure services, aimed at increasing data security whilst reducing any risk of data loss during transit.

SafeHouse Technologies

SafeHouse Technologies

SafeHouse is a cloud-based, high-end cybersecurity platform that can secure and insure any device that is connected to it.

Cloud GRC

Cloud GRC

Cloud GRC is an innovative cybersecurity company with solutions and expertise in Cybersecurity Strategies & Frameworks, Threat & Risk Assessment, Cloud Security, and Regulatory Compliance Requirements

Shift5

Shift5

Shift5 focus on securing operational technology (OT) by building best-in-class, dual-use products serving military and commercial entities.

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

Wickr

Wickr

Wickr's mission is to secure the world's most critical communications. Wickr provides the highest standard of encryption trusted by millions worldwide.

Luxembourg House of Financial Technology (LHoFT)

Luxembourg House of Financial Technology (LHoFT)

Offering start-up incubation, co-working spaces including a soft-landing platform, the LHoFT connects and creates value for the entire Luxembourg FinTech ecosystem.

QAlified

QAlified

QAlified offer independent testing and quality assurance services for software projects including security testing.

Auriga

Auriga

Auriga create innovative software and have become a benchmark for high quality banking software including cyber security solutions to protect business critical devices.