News

2023-07-31

Trains Are A Cyber Security Risk

Cyber security concerns are increasing along with political tensions, and because critical infrastructures might be at risk from hackers.

2023-07-31

Software Faults Ground F-35 Warplanes

The US Defense Department will stop accepting some newly built F-35 multirole jets as delays in upgrading the aircraft continue.

2023-07-31

US Intel Leaders “It’s time to be Data Serious”

The US Government says it’s time to get serious about data, how it is collected, curated, and capitalised by humans & by machines.

2023-07-31

JumpCloud Says Nation-State Hackers Hit Specific Customers

US-based enterprise software firm JumpCloud says it was cyber hack attacked by advanced North Korean nation-state actors.

2023-07-22

Shell Confirms Supply Chain Attack

MOVEit: Shell is one of a number of leading organisations that has been hacked & its data compromised by cyber criminals known as Cl0p.

2023-07-22

Russian Hackers Hit Ukrainian Security Services

Active & Dangerous Threat: Russian state-sponsored hackers named Gamaredon have attacked thousands of Ukraine government computers.

2023-07-21

Cybersecurity Threats To Digital Banking & How to Mitigate Them

Digital banking offers great convenience - it also exposes users to cybersecurity threats. Together, banks & customers can mitigate these threats.

2023-08-07

What’s The Problem With Open-Source Software & Cybersecurity?

There is an illusion of trust around open-source software and its code, which leads to the potential for unique cybersecurity vulnerabilities.

2023-08-09

Getting Your First Cyber Security Job 

Cyber Skills Shortage: For those interested in a career in cyber security, there are many opportunities to enter this vast and interesting field. 

2023-08-04

Generative AI Tools Help Criminals Launch More Sophisticated Attacks

WormGPT: Even attackers with limited skills can use this technology, making it an accessible tool for a broader spectrum of cyber criminals.

2023-08-08

A Database Tracking Maritime Cyber Attacks

The incidents in the database demonstrate the relevance of cyber security to the modern maritime industry and the major vulnerabilities that exist.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

Northwave

Northwave

Northwave offers an Intelligent combination of cyber security services to protect your information.

Real Random

Real Random

Real Random is on a mission to enhance existing and new crypto-systems with its revolutionary solution to generating numbers that are Truly Random.

A-LIGN

A-LIGN

A-LIGN is a technology-enabled security and compliance partner trusted by more than 2,500 global organizations to mitigate cybersecurity risks.

Cyber Covered

Cyber Covered

Cyber Covered provide complete website & data cover with market leading cyber insurance and powerful compliance software in one affordable package.

Logic Supply

Logic Supply

Logic Supply is a global industrial PC company focused on hardware for the IoT edge. We design highly-configurable computers engineered for reliability.

PeckShield

PeckShield

PeckShield is a blockchain security company which aims to elevate the security, privacy, and usability of entire blockchain ecosystem by offering top-notch, industry-leading services and products.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

TAG Cyber

TAG Cyber

TAG Cyber's mission is to provide world-class cyber security research, advisory, and consulting services to enterprise security teams around the world.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

Vector Choice Technologies

Vector Choice Technologies

Vector Choice Technology Solutions has a long standing reputation in cyber security consulting since 2008.

BlazeGuard

BlazeGuard

At BlazeGuard, we understand that navigating the complex world of cybersecurity can be challenging. That’s why we make it our mission to simplify the process for you.

Hanwha Systems

Hanwha Systems

Hanwha Systems is a global company based in South Korea providing defense electronics and smart ICT solutions.

Aikido Security

Aikido Security

Aikido is the no-nonsense security platform for developers. Secure your code, cloud, and runtime in one central system. Find and fix vulnerabilities automatically.