News

2023-12-04

Trouble At Three

Thousands of Three mobile customers in the UK say they could not get signal on their phones over the weekend and the problem is persisting.

2023-12-01

Fake Login Pages To Steal Bank Data

Octo Malware: Customers of some of Australia’s major Banks are being caught out by a convincing campaign, designed to steal personal data.

2025-04-07

The Global Effects Of The Internet On Society

The Internet is the decisive technology of our age, driving both technological change and the way that human societies work & relate to each other.

2023-11-30

Attack On Denmark's Critical Infrastructure

Massive Russian Cyber Attack: Details are emerging of a sequence of crippling large-scale attacks on Danish energy companies in May 2023.

2023-11-29

Supply Chain Attack On British Law Firms

Specialist Managed Service Provider Outage: As many as 200 firms were left unable to access phone calls, emails, or case management systems.

2023-11-28

Spy Agencies Are Hiring Via LinkedIn

Chinese espionage agencies are using fake LinkedIn accounts to try to recruit US citizens with access to government & commercial secrets.

2023-11-28

Cyber Security Executive Confesses To Hacking Hospitals

Business Development - The Wrong Way: C-Level executive pleads guilty to hacking & leaking patient data in a failed attempt to generate sales.

2023-11-27

Cyber Attacks On Israel Expand

SysJoker: A new version of a sophisticated cross-platform malware that can be installed & stay undetected before delivering malicious payloads.

2023-11-27

Creating A Top-Notch Financial App With Advanced Cybersecurity

The Ultimate Guide: What is the current role of cybersecurity in FinTech and what standards are better to opt for? By Serge Khmelovskyi

2023-11-27

Securing National Communications Infrastructure

Digital Connections: Network disaggregation is vital to protecting critical telecoms infrastructure against external threats. By Richard Brandon

2023-11-24

Intelligent Automation & AI Can Improve Business Resilience

Combined with human intelligence, AI can improve business resilience and a failure to invest risks business efficiency & reputation. By Scott Dodds

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

FlashRouters

FlashRouters

FlashRouters offers DD-WRT compatible router models with improved performance, privacy/security options, and advanced functionality.

FIDO Alliance

FIDO Alliance

FIDO Alliance is a non-profit organization formed to address the lack of interoperability among strong authentication devices.

National Cyber-Forensics & Training Alliance (NCFTA) - USA

National Cyber-Forensics & Training Alliance (NCFTA) - USA

NCFTA is a trusted alliance of private industry and law enforcement partners dedicated to information sharing and disrupting cyber-related threats.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

Brainloop

Brainloop

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

Approach

Approach

Approach is a leading provider of cyber security consulting and secure application development services in Belgium.

Featurespace

Featurespace

Featurespace is a world-leader in Adaptive Behavioural Analytics and creator of the ARIC platform for fraud and risk management.

ICT Reverse

ICT Reverse

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure.

DivvyCloud

DivvyCloud

DivvyCloud protects your cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

Guardian Digital

Guardian Digital

Guardian Digital makes email safe for business. Threat-ready business email protection. Fully supported.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

Nicos AG

Nicos AG

Nicos AG specializes in secure, global data communication.

CyberHive

CyberHive

CyberHive offer a complete suite of threat protection modules that seamlessly integrate to block current, as well as future threats.