News

2023-09-26

Quadruple Extortion  Ransomware

Phases Of The Extortion Cycle: Criminals are getting more focused, specialized & effective in maximizing the ransom they extract from their victims.

2023-09-26

Severe Risks From Remote Access Exposure

Response Time: Organisations are finding it difficult to manage their attack surfaces at a speed & scale necessary to combat threat actor automation.

2023-09-25

Is Your Business Ready To Embrace Artificial Intelligence? 

AI presents itself in a different way - it’s an entirely new area that requires continuous development and a new set of rules. By Andy Dunn

2023-09-25

Unmasking The Silent Threat Of Cryptojacking 

Zombie Devices: Unlike ransomware, cryptojackers want to remain in the system for as long and quietly as possible. By Spencer Starkey

2023-09-25

Zero-Trust: Protecting From Insider Threats

Unintended Consequences: Organisations need to constantly guard against insider threats - the cybersecurity risk that comes from within.

2023-09-22

Europol Identifies The Top Cyber Threats

Ransomware affiliate programs have become the main business model for ransomware groups, deploying multi-layered extortion techniques.

2023-09-22

Jargon Buster: Untangling The Complexity In Cybersecurity 

Device Security Affects Us All: Wouldn’t it be helpful to return to basics to explain & design security in a much easier way? By Chris Meidinger

2023-09-22

Exploring How Generative AI Is Contributing To Cybersecurity Threats & Risks

Generative AI is transforming businesses, while simultaneously posing significant risks and dangers in the hands of hackers. By Farwa Sajjad

2023-09-21

Australian Government Suffers A Widespread Ransom Attack

Prolific ransomware group ALPHV hacked a law firm providing services to numerous government agencies, facilitating a wave of secondary attacks.

2023-09-20

Chinese Hackers Have Been Reading US Government Emails

An advanced Chinese spying campaign that involved breaches of Government & Legislature emails went undetected for months.

2023-09-20

Enterprise Cybersecurity Today: A Vast Landscape To Secure

The trends towards remote working, online shopping & banking have multiplied the number of endpoints that need protection. By Richard Yew

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

Superscript

Superscript

Superscript (formerly Digital Risks) is an insurance broker for small businesses, sole-traders, landlords and high-growth tech firms. Our services include Cyber Liability insurance.

Ground Labs

Ground Labs

Ground Labs is a security software company dedicated to making sensitive data discovery products that help organisations prevent sensitive data loss.

netfiles

netfiles

netfiles offers highly secure data rooms for sensitive business processes and secure data exchange.

LuJam Cyber

LuJam Cyber

LuJam Cyber is a cybersecurity company that provides protection to SME Networks.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

Cyber Griffin

Cyber Griffin

Founded by the City of London Police in 2017, Cyber Griffin is an initiative that supports businesses and individuals in the Square Mile to protect themselves from cyber crime.

Prescient Solutions

Prescient Solutions

Prescient Solutions is a managed services provider, using a cloud-based model to provide IT solutions to small, mid-sized, global organizations and government entities.

Conosco

Conosco

Conosco are industry-leading experts throughout the UK in strategic consulting, project delivery, business communications, support, and security.

Zigrin Security

Zigrin Security

Zigrin Security offer comprehensive, hands-on security testing of internal networks, applications, cloud-based solutions, e-commerce applications and mobile devices.

Sendmarc

Sendmarc

Sendmarc automates the process of protecting your domain from being used in email impersonation and phishing attacks.

ZX Security

ZX Security

ZX Security is a New Zealand owned and operated cyber security consultancy.

Cynical Technology

Cynical Technology

Cynical Technology is a Nepalese cybersecurity company with expertise in security consulting, auditing, testing and compliance.

CI-ISAC Australia

CI-ISAC Australia

CI-ISAC has been designed to support and promote existing legislation and Government initiatives that are working to uplift cyber resilience across critical infrastructure sectors.

Dispel

Dispel

Dispel makes the fastest secure remote access for industrial networks. Built by operators for operators: a zero trust engine for your entire OT, IoT, and xIoT stack.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.