News

2023-05-22

Web Application Security Testing: A Complete Guide

Web application security testing plays a vital role in protecting sensitive data from potential threats like SQL injection and cross-site scripting.

2023-05-19

How Unsupported Technologies Threaten Business Security

Obsolete software cannot be updated or patched and hackers know that unsupported applications are their opportunity. By Steve Whiter

2023-05-29

The Future Of Artificial Intelligence

AI is shaping the future of humanity across nearly every industry and will act as a technological innovator into the foreseeable future.

2023-05-19

France Fines Clearview AI For Failing To Pay The Previous Fine

Clearview has failed to cooperate with the French data regulator and ignored multiple requests to cease using biometric data without consent.

2023-05-18

How Can We Realise Cyber Resilience Through Education?

Education is key to enabling organisations to navigate the complex and ever-evolving landscape of cybersecurity threats. By Will Dixon

2023-05-18

Iranian Government Uses Android Malware For Mobile Surveillance

BouldSpy: Covertly installed Android spyware used to monitor arms shipments, surveil dissident & minority groups, alcohol and drugs trafficking.

2023-05-16

ABB Struck By Black Basta Ransomware

Hundreds of computers have been compromised as a result of a ransomware attack on the Windows Active Directory used by ABB. 

2023-05-16

The Philadelphia Inquirer Newspaper Hacked 

Unable To Print: The attack was first detected when editors & journalists found the newspaper’s content-management system was not working.

2023-05-16

Breach Will Cost Capita At Least £20m

Update: Capita faces a large bill to fix the damage caused and there could be significant consequential claims from its corporate customers.

2023-05-15

Higher Education: Lessons In Cybersecurity

With a large potential attack surface and big  rewards for hackers, it's easy to see why universities are high on the hit list. By Chris Boyle

2023-05-15

Effective Enterprise Vulnerability Management & Compliance

ManageEngine Vulnerability Manager Plus: The comprehensive and effective enterprise vulnerability management and compliance solution 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

DoD Cyber Crime Center (DC3)

DoD Cyber Crime Center (DC3)

DC3 is a US Department of Defense (DoD) center of excellence for Digital and Multimedia forensics.

AV Test

AV Test

The AV-TEST Institute is a leading international and independent service provider in the fields of anti-virus research and IT security.

Center for a New American Security (CNAS)

Center for a New American Security (CNAS)

CNAS is the nation's leading research institution focused on defense and national security policy. Cyber security issues are an intrinsic element of the national security debate.

Tinfoil Security

Tinfoil Security

Tinfoil is a simple, developer friendly service that lets you scan your website for vulnerabilities and fix them quickly and easily.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Advisen

Advisen

Advisen is the leading provider of data, media, and technology solutions for the commercial property and casualty insurance market including cyber risk.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

Fortalice

Fortalice

Fortalice provide customizable consulting services built on proven methodology to strengthen your business cyber security defenses.

German Accelerator

German Accelerator

German Accelerator supports high-potential German startups in successfully entering the U.S. and Southeast Asian markets.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

Blue Cedar

Blue Cedar

Blue Cedar's mobile app security integration platform secures and accelerates mobile app deployment for enterprises and government organizations around the world.

HackEDU

HackEDU

HackEDU provides secure coding training to companies ranging from startups to the Fortune 500.

Secolve

Secolve

Secolve is Australia’s next generation OT specialist cyber security firm, working with key industries to protect the nation’s critical infrastructure.

Hacker School

Hacker School

Hacker School offers technology motivated training programs that provide Cyber Security Certifications and Courses.

Concertium

Concertium

Concertium is a complete cybersecurity partner equipped with the expertise and services to deliver end-to-end visibility and protection from evolving cyber threats.