News

2023-08-01

Have We Become Complacent About The ‘Insider Threat’?

Time Bomb: Human beings will always make mistakes, let their guard down, and behave in ways that leave company data exposed. By Jon Fielding

2023-07-31

British University Data Breaches Are A Lesson For All

The potential reach and impact of a breach is serious, placing personal information at risk and disrupting millions of UK students. By Stuart Jubb

2023-07-27

Protecting Your Home Devices Against Attack

Not maintaining the appropriate security measures for your smart devices, their apps & your Wi-Fi network could cause you a lot of trouble.

2023-07-14

WEBINAR | Uplevel Your Cloud Security Posture With CSPM

WEBINAR | JULY 27: Navigating cloud security: The importance of Cloud Security Posture Management tools.

2023-07-26

Setting Up An Operational Resilience Framework

In the face of a destructive cyberattack enterprises must plan to mitigate the impact based on pre-established objectives. By Bill Nelson

2023-07-14

Hollywood Stars Strike Over AI Human Replacements

Virtual Body Double: Writers and actors are concerned about generative Artificial Intelligence tools replacing their roles in film & TV.

2023-07-15

Britain's Biggest Hospital Held To Ransom

ALPHV, or BlackCat, has infiltrated one of the UK’s largest NHS hospital groups, threatening to expose a vast cache of confidential staff data.

2023-07-25

Managing The Effects Of AI-Driven Cyber Attacks

Criminals are scaling how they compromise systems & execute attacks. Organisations need agile, comprehensive, unified security solutions.

2023-08-09

WatchGuard Expands Identity Protection Capabilities

The new solution adds advanced password management capabilities and Dark Web monitoring to help protect corporate credentials.

2023-08-03

Chinese Spies Used Forged Validation Tokens To Access Government Emails

Chinese hackers breached email accounts at numerous organisations, including US government agencies, to intercept secret information.

2023-07-19

RomCom Hackers Target NATO Summit

RomCom Rat: Russian state-sponsored hackers detected using malicious downloads targeting delegates attending a NATO conference.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

High Technology Crime Investigation Association (HTCIA)

High Technology Crime Investigation Association (HTCIA)

HTCIA was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

BA-CSIRT

BA-CSIRT

BA-CSIRT is a center which is dedicated to assist and raise awareness among citizens and the Government of the City of Buenos Aires in everything related to information security.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

Future Technology Systems Company (FutureTEC)

Future Technology Systems Company (FutureTEC)

FutureTEC is a leading Information Technology Solutions Provider, delivering world-class Information Security, Information Management, and Business Solutions.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

Netstar

Netstar

Netstar is an IT Support company based in Central London providing fully managed IT Support, Cyber Security and Technology Consulting services.

Kyndryl

Kyndryl

Kyndryl has a comprehensive portfolio that leverages hybrid cloud solutions, business resiliency, and network services to help optimize your IT workloads and transformations.

e5 Lab

e5 Lab

e5 Lab seeks to develop solutions to challenges faced by the shipping industry including digital transformation, autonomous technologies and big data in order to promote safe and efficient operations.

KATIM

KATIM

KATIM is a leader in the development of innovative secure communication products and solutions for governments and businesses.

SEK Security Ecosystem Knowledge

SEK Security Ecosystem Knowledge

SEK helps companies in the complex path of cybersecurity; in the analysis, detection and prevention of digital threats.

Systal Technology Solutions

Systal Technology Solutions

Systal is a global managed network and security service and transformation specialist. We help enterprise-level businesses maximise the security and business value of their complex IT infrastructure.

Breathe Technology

Breathe Technology

Breathe Technology has been providing Managed IT Support/ Service Desk, Cloud Services, Cyber Security & Communications to businesses and schools since 2003.

TrueDeploy

TrueDeploy

Making Software Security EASY. The Security Status of Your Software in One Place. All you have to do is Deploy.