News

2023-03-10

The Dark Side Of AI

Using ChatGPT, hackers can customize any communication with unique content, making these attacks more difficult to recognize & detect.

2023-03-06

Detecting Digital Injection To Counter Deepfake Biometric Fraud 

IDLive Face Plus: Detecting digital injection attacks where fraudsters use hardware & software hacks to substitute biometric capture with fake images. 

2023-03-06

Cyber Criminals Are Quick To Use ChatGPT 

Cyber criminals have begun using OpenAI’s artificially intelligent chatbot to construct hacking tools, create deepfakes and generate malware.

2023-03-06

New US National Cyber Security Strategy

The US economy can no longer rely on the sort of cyber security measures which have failed to prevent huge economic losses caused by ransomware.

2023-03-03

The US Marshals Service Gets Hacked

A major ransomware attack has compromised some of its most sensitive information, including potential targets of US Federal investigations.

2023-03-03

Banning Ransomware Payments - Will It Work? 

In the light of the ever-growing ransomware threat, what would be the impact banning ransomware payments and would it help? By Antony Hogg

2023-03-03

Big British High Street Retailer Attacked

Staff Data Stolen: WH Smith does not say how many of its 10,000-plus current and former employees have been affected by the breach.

2023-03-02

The Office Workplace ln The Hybrid World

Remote Teamwork In Multiple Locations & Settings: What should a modern office look like in today's world of hybrid work. By Samir Desai

2023-02-28

The Virtual & Real Cybersecurity Threats In The Metaverse 

Virtual World: The future of the metaverse as a usable interactive environment is doomed if we fail to properly secure it. By Spencer Starkey

2023-02-28

Securing Valuable Data

Crypto-segmentation is a vital tool in creating a security model that truly supports the need to safeguard valuable data assets. By Simon Pamplin

2023-03-01

Webinar: Firewall-as-a-service (FWaaS)

Discover the benefits of firewall-as-a-service (FWaaS) in a secure access service edge (SASE) model: WATCH NOW

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ITpreneurs

ITpreneurs

ITpreneurs provides IT training content, Instructors, Learning Infrastructure and services to IT Training providers.

eSentire

eSentire

eSentire is the authority in Managed Detection and Response Services, protecting the critical data and applications of organizations from known and unknown cyber threats.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

Ground Labs

Ground Labs

Ground Labs is a security software company dedicated to making sensitive data discovery products that help organisations prevent sensitive data loss.

DataArt

DataArt

DataArt is a global technology consultancy that designs, develops and supports unique software solutions. Areas of activity include software security testing.

Montimage

Montimage

Montimage develops tools for testing and monitoring networks, applications and services; in particular, for the verification of functional, performance (QoS/QoE) and security aspects.

Buglab

Buglab

The Buglab contest and Vigilante Protocol help companies all over the world to discover and fix vulnerabilities on their digital solutions or assets.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

Cyphere

Cyphere

Cyphere is a cyber security company that helps to secure most prized assets of a business. We provide technical risk assessment (pen testing/ethical hacking) and managed security services.

Cyvatar

Cyvatar

Cyvatar is a technology-enabled cyber security as a service (CSaaS) provider delivering smarter managed security to help you achieve compliance and security faster and more efficiently.

TheGreenBow

TheGreenBow

TheGreenBow is a trusted VPN software company. We help organizations and individuals become cyber-responsible. For this, we design and develop reliable and easy-to-use solutions.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

Bit Sentinel

Bit Sentinel

Bit Sentinel is an information security company. We help companies like yours discover, prioritize, and effectively remediate potential cybersecurity risks.

Worksent Technologies

Worksent Technologies

Worksent is a Trusted white-label offshore support partner for MSPs and MSSPs.

ViCyber

ViCyber

ViCyber is an Australian based company whose mission is to simplify and strengthen cybersecurity for all businesses, irrespective of size.

Foresights

Foresights

Foresights is a Nordic company utilizing advanced intelligence tradecraft and extensive cyber security capabilities to deliver services and advisory tailored to our client’s critical requirements.