News

2023-09-08

Poland’s Train Network Disrupted

Standstill In Szczecin: Poland's security & intelligence services are investigating an attack on its railway system's communications network.

2023-09-08

Qakbot Malware Taken Down

Qakbot malware infected victims via spam emails with malicious attachments, links and served as a platform for ransomware operators. 

2023-09-07

Can Shortening The Cyber Stack Increase Stability?

More Is Not Better: CISOs would derive more benefit from improving control over the stack rather than buying in more tools. By Tim Wallen

2023-09-07

The Unique TTPs Attackers Use To Target APIs

Application Programming Interfaces are the gateways to key data, and attackers will go to extraordinary lengths to compromise them. By Andy Mills

2023-09-06

Establishing A Digital Immune System

Creating The Self-Healing Enterprise With DIS: Why immunity should be your new favourite cybersecurity metaphor. By Matt Tuson

2023-09-06

LockBit Hacked British Military Data 

Details are emerging about how LockBit got access to top secret military data via a metal fence manufacturer running 20-year-old software.

2023-09-06

How To Check If A Link Is Safe

Malicious Links - A Step-by-Step Guide: Everyone connected to the Internet needs to learn how to test links for viruses and other hidden dangers. 

2023-09-05

Hackers Hit British Defence Ministry

Supply Chain Hack: Top secret security information on British military & intelligence sites has been leaked by hackers linked to Russia.

2023-09-04

Hackers Target Satellites 

Timing Systems, GPS & Communications: Orbital satellites keep the world running smoothly but have just the same vulnerability as ground facilities.

2023-09-06

Virtual Event: How to make SIEM grow with your organization

Webinar | Sept. 21st | SANS and AWS experts share how to ensure tailored cybersecurity solutions with Security Information & Event Management (SIEM).

2023-09-04

How To Combat Cyber Security Burnout

Burnout Syndrome Is Real: Stop this happening to your cyber security team by automating and consolidating technologies. By Diana Harter

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Zayo

Zayo

Zayo is a leading global bandwidth infrastructure services provider for high-performance connectivity, secure colocation and flexible cloud services.

Cyber Exec

Cyber Exec

Cyber Exec is an executive search firm dedicated to global talent acquisition in Cyber Security, Information Technology, Defense...

Cybersecurity Collaborative

Cybersecurity Collaborative

CyberSecurity Collaborative is a forum for CISOs to share information that will collectively make us stronger, and better equipped to protect our enterprises from those seeking to damage them.

Security & Intelligence Agency (SOA) - Croatia

Security & Intelligence Agency (SOA) - Croatia

SOA is the Croatian security and intelligence service. Areas of activity include Cyber Security and Information Security.

Information System Authority (RIA) - Estonia

Information System Authority (RIA) - Estonia

RIA ensures the interoperability of the state’s information system, organises activities related to information security, and handles security incidents in Estonian computer networks.

Guardian Data Destruction

Guardian Data Destruction

Guardian Data Destruction provides a comprehensive suite of onsite e-data destruction services.

Gigit

Gigit

Gigit’s Service portfolio focuses on your business’ needs and the integration of comprehensive cybersecurity policies, plans, procedures, and practices into your business culture and operations.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

CyNam

CyNam

CyNam is a platform for enabling the growth and development of people and organisations within Cheltenham’s flourishing cyber technology ecosystem.

NXTsoft

NXTsoft

NXTsoft’s solutions help businesses secure, connect and optimize their data to maximize revenue opportunities, enhance profitability, and mitigate cybersecurity risk.

Creative Destruction Lab (CDL)

Creative Destruction Lab (CDL)

Creative Destruction Lab is a nonprofit organization that delivers an objectives-based program for massively scalable, seed-stage, science- and technology-based companies.

InfoSec4TC

InfoSec4TC

InfoSec4tc is an online Information Security Courses, Training, and Consultancy provider.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

ZAG Technical Services

ZAG Technical Services

ZAG Technical Services is an award-winning information technology consulting firm delivering digital transformation solutions, IT assessments, managed services, security, and support.

Teal Technology Consulting

Teal Technology Consulting

TEAL Technology Consulting is your trusted advisor for all your information security needs.

SENTRIQS

SENTRIQS

SENTRIQS advanced encryption technology is engineered to defend against the most sophisticated cyber threats, keeping your operations efficient and secure.