News

2023-06-07

Ransomware Trends In The Aviation & Maritime Industries

Transport sector organisations have a distinctive profile from an attacker’s perspective, making them an especially lucrative target.

2023-06-07

Cyber Security Insurance - What You Need To Know

Cyber Insurance is a smart precaution for any size business, but what does it typically include and how do you make a good policy choice?

2023-06-07

Update: BBC, British Airways & Boots In Supply Chain Attack

CLOP: Hackers found a software vulnerability to penetrate a growing number of UK firms in a major supply chain exploit. Now they want ransom.

2023-06-06

British Business Moves To Adopt Digital Identity

More than half of UK organisations either currently use digital identity or plan to soon incorporate digital identity solutions into their operations.

2023-06-05

Musk's Brain Chip Firm Gets US Approval for Human Analysis

Elon Musk's brain-chip company Neuralink has now been approved by the US Food and Drugs Administration (FDA) to conduct human tests.

2023-07-05

Advanced Phishing Attacks Tripled In 2022

Protecting Organisations Is More Important Than Ever: Hackers are using new tools to simplify & automate the process of generating attacks.

2023-07-12

Iranian Hackers Using Windows Kernel Driver

Agrius Threat Group: Iranian hackers are using a new Windows kernel driver called Wintapix to get unauthorized access to targeted systems.

2023-06-07

A New Approach To Cyber Security Helps Resist Extortion

Nearly 80% of organisations hit by ransomware are capable of recovering their critical data & systems, without paying a ransom.

2023-07-05

A Decade Of ‘Bad Magic’ In Cyber Espionage

Sophisticated Malicious Activities: A modular framework codenamed CloudWizard, which can take screenshots, record microphones & steal Gmail.

2023-07-04

The Limitations of AI

'Truth Is The Bottom Line': Carl Bernstein has warned that Artificial Intelligence is creating serious challenges for the future of journalism.

2023-06-05

Take Practical Measures To Avoid An Attack

The Common Threat: Failing to implement basic cyber security measures and not training your people presents an open door to hackers.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Synology

Synology

Synology provides high-performance, reliable, and secure Network Attached Storage (NAS) products.

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

Syhunt Security

Syhunt Security

Syhunt is a leading player in the web application security field, delivering its assessment tools to a range of organizations across the globe.

Intelligent Waves

Intelligent Waves

Intelligent Waves holds and manages contracts to provide an array of intelligence, operational, communications and IT support to the USG in austere, forward-deployed, hazardous duty environments.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

Spotit

Spotit

Spotit offers a wide-ranging portfolio of technologies and services, from consultancy, assessments and pentesting to the set up of completely new security and network infrastructures.

Digimune

Digimune

Digimune is an all-encompassing cloud-based cyber risk protection platform that guards you against the dangers of our digital world.

Cranium

Cranium

Cranium are an international consultancy organisation specialised in privacy, security and data management.

HashiCorp

HashiCorp

At HashiCorp, we believe infrastructure enables innovation, and we are helping organizations to operate that infrastructure in the cloud.

Anzen Technology Systems

Anzen Technology Systems

Anzen create software solutions which allows organisations to utilize the public cloud for sensitive or classified information, whilst increasing data security and retaining data sovereignty.

Cyabra

Cyabra

Cyabra is leading the fight against disinformation. Our AI shields companies and the public sector by uncovering malicious actors, bot networks, and GenAI content.

Velstadt Cybersecurity

Velstadt Cybersecurity

Velstadt's team of experienced professionals works on identifying vulnerabilities, analyzing threats, and developing strategies to ensure the highest level of security.

System360

System360

System360 is one of Houston's top suppliers of network administration, design, security, and support services.

Black Bison Cyber

Black Bison Cyber

Black Bison Cyber is a premier cybersecurity firm specializing in elite, discreet, and highly personalized digital protection for high-profile individuals and executives.

COcyber

COcyber

COcyber aims to enhance collaboration between the cybersecurity civilian and defence spheres. It is a two-year project funded by the European Union and it kicked off in July 2024.