News

2025-02-07

Managing Dark Web Exposure In 2025

Navigating The Shadowy Frontiers: The dark web’s trade in stolen data presents several big challenges for organisations. By Vishaal Hariprasad

2025-02-12

British Cyber Code Of Practice For Developing AI

The code applies to developers, system operators, and data custodians at organisations that create, deploy, or manage AI systems.

2025-02-11

Hackers Innovate To Attack Microsoft 365 Accounts

High Speed Brute Force: Hackers have been using HTTP client tools for sophisticated account takeover attacks on Microsoft 365 environments.  

2025-02-07

Australia Bans DeepSeek In Government Networks

Backlash: Australia has banned DeepSeek from all their government systems because of what it says is an unacceptable national security risk.

2025-02-13

Texas Creates Its Own Cyber Command Center

Texas is the eighth largest economy in the world, with numerous Oil, Gas, Financial & Military targets for cyber criminals and nation state actors.

2025-02-11

Ransomware Attack on Tata Tech

Tata Technolgies, a major service supplier to government and the automotive, aerospace, and heavy machinery industries discloses a data breach.

2025-02-07

Google Reports Widespread Misuse Of Gemini AI

Google’s says that Iran is the leading state actor exploiting Gemini, its AI-powered chatbot, for hacking, espionage & information warfare.

2025-02-06

File Transfers Can Be The Weakest Link

File transfers need to be easy, quick and most of all, safe. But that requires more than just a traditional email gateway solution. By Richard Bourne

2025-02-05

A History Of Artificial Intelligence And Its Current & Future Development [extract]

AI Is No Longer A Technology Of The Future: It is a technology that already impacts all of us, ranging across many different applications.

2025-02-05

Cyber Threat Forecast Part 2 - India   

Strained relations across South Asia, as well as between India & nation-states further afield, threatens an explosion of cyber activity. By Craig Watt

2025-02-05

New Study From Gen Reveals Over 600% Rise in 'Scam-Yourself' Attacks

Genius In Simplicity: The attack's success relies not on sophisticated malware or zero-day exploits but on human psychology and social engineering.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

OneVisage

OneVisage

Our award-winning 3DAuth digital identity platform turns any consumer mobile device into a real-time 3D facial scanner that securely authenticates the user in seconds.

Bowbridge

Bowbridge

Bowbridge provides anti-virus and application security solutions for SAP systems.

Vector Informatik

Vector Informatik

Vector Informatik is a specialist in automotove electronics and provides services, embedded software and tools for securing embedded systems against cyber-attacks.

IntaPeople

IntaPeople

IntaPeople are IT and engineering recruitment specialists. We have specialist teams for job sectors including Cybersecurity, IT infrastructure and DevOps.

Robert Walters

Robert Walters

Robert Walters is one of the world's leading global specialist professional recruitment and recruitment process outsourcing consultancies.

InfoSystems Inc

InfoSystems Inc

InfoSystems provides reliable IT solutions to build and maintain strong and secure systems for both SMB and enterprise organizations.

Realsec

Realsec

RealSec is an international company and is a developer of encryption and digital signature systems and Blockchain for the Banking and Methods of Payment sectors, Government and Defense and Multisector

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

DNS Research Federation (DNSRF)

DNS Research Federation (DNSRF)

DNSRF's mission is to advance the understanding of the Domain Name System's impact on cybersecurity, policy and technical standards.

Focus Group

Focus Group

Focus Group are one of the UK’s leading independent providers of essential business technology. Here to take care of all your telecoms, IT and connectivity services.

Cyber Guards

Cyber Guards

Cyber Guards provide comprehensive, turn-key cyber security programs for small and mid-size business for about the cost of one full-time cybersecurity hire.

StackGen

StackGen

StackGen (formerly appCD) automatically generates Infrastructure from Code (IfC) based on application code with golden standards applied.

Boo Consulting

Boo Consulting

Boo Consulting is a trusted privacy and risk consultancy firm. We are driven to help you find an appropriate solution that will suit your budget and requirements.

LiveAction

LiveAction

LiveAction’s Network Intelligence platform transforms complex data into actionable insights, providing organizations with a comprehensive view of their network.