News

2023-04-20

What Is A Credential Stuffing Attack & How To Protect Your Organization

Credential stuffing is a type of attack that relies on the fact that many people use the same usernames & passwords across multiple accounts.

2023-04-28

The Evolution Of Russian Cyber Warfare

Future Warfare: Intelligence leaks provide an insight into Russian cyberwar objectives & potential long-term threats to Western organisations.

2023-04-21

An Increasingly Diverse Attack Landscape

Covert Methods: SonicWall's research report details a more diversified cyber attack landscape and shifting patterns of threat actor strategies.

2023-04-19

British Cyber Security Agency Issues An Alert

Russian Hackers Target Critical Infrastructure: Russia seeks to "disrupt or destroy" Britain's critical infrastructure, Cabinet Office warns.

2023-04-26

Sharing Threat Intelligence

Cyber attacks have increased in frequency & sophistication, presenting significant challenges for organisations in defending their data & systems.

2023-04-19

Online Safety Bill UK: WhatsApp, Encryption & The Implications For Privacy

The Legislation Focuses On Child Protection: So why are WhatsApp and other organisations opposing the proposed new laws? By Andrew Parsons

2023-04-26

Selling Digital Insecurity

Offensive cyber capabilities pose a significant threat to international security. Such capabilities can also cause significant damage.

2023-04-25

As A Business Leader, You Must Manage Cyber Risk 

Cyber attacks are a key risk for boards and any director seeking to add value for corporate stakeholders should appreciate the growing jeopardy.

2023-04-18

Soft Cell Hackers Have New Targets

An international hacking campaign targeting global telecommunications companies to extract personal data of persons of interest to China.

2023-04-24

Israeli Hacking Spyware In Widespread Use

New Israeli-made spyware resembling NSO Group's notorious Pegasus malware has been used to target journalists & politicians in many countries.

2023-04-25

Alibaba Plans An Artificial Intelligence Rival To ChatGPT

Truth Via A Thousand Questions: Chinese technology giant Alibaba will launch its own ChatGPT-style product called Tongyi Qianwen.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

National Cybersecurity Hub - South Africa

National Cybersecurity Hub - South Africa

The mission of the National Cybersecurity Hub is to be the central point of collaboration for cybersecurity incidents in South Africa.

GlobalPlatform

GlobalPlatform

GlobalPlatform’s specifications are highly regarded as the international standard for enabling digital services and devices to be trusted and securely managed throughout their lifecycle.

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

Cyber Intelligence 4U

Cyber Intelligence 4U

Cyber Intelligence 4U is an educational services company that provides two levels of cybersecurity training programs: executive and technical.

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo is the UK’s largest cloud and cyber security event.

Internet Crime Complaint Center (IC3)

Internet Crime Complaint Center (IC3)

The Internet Crime Complaint Center provide the public with a reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity.

Liminal

Liminal

Liminal is a boutique strategy advisory firm serving digital identity, fintech, and cybersecurity clients, and the private equity / venture capital community.

Inspectiv

Inspectiv

Inspectiv offers a turn-key solution to continuously identify security vulnerabilities and provide security assurance.

Pillar Technology Partners

Pillar Technology Partners

Pillar Technology Partners is an Information Security Company with a focus on improving Cyber Risk and optimizing the processes and technology that underpin the security of your information assets.

Nudge Security

Nudge Security

Nudge Security offer the world's first-ever SaaS security solution to discover shadow IT and curb SaaS sprawl across any device or location and nudges employees towards optimal security behavior.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

SoftForum

SoftForum

SoftForum is a company specializing in next-generation information security solutions in the Quantum-Resistant-Cryptography (PQC) field.

CI-ISAC Australia

CI-ISAC Australia

CI-ISAC has been designed to support and promote existing legislation and Government initiatives that are working to uplift cyber resilience across critical infrastructure sectors.

Unified National Networks (UNN)

Unified National Networks (UNN)

UNN’s mission is to unify the national networks and create a modern and cost efficient digital platform connecting the entire country.

XONA Systems

XONA Systems

XONA is The Zero Trust user access platform for the OT enterprise. Secure operational access to critical systems - from anywhere.

Maveris

Maveris

Maveris is an IT and cybersecurity company committed to helping organizations create secure digital solutions to accelerate their mission.