News

2024-12-31

What Are The Key Trends That Will Shape Tech In 2025?

Weaponised AI & Compliance: Executives at NinjaOne identify four key trends that will shape the technology industry in 2025 and beyond. 

2024-12-30

How CISOs Can Master Cyber Attack Communications

Under Pressure: The modern CISO's responsibility goes beyond technical leadership, especially when things go wrong. By Mark Bowling

2024-12-27

Using AI To Its Full Cybersecurity Potential

2024 Was The Year Of AI: We spoke to four industry experts to discover their predictions for 2025 when it comes to AI and its pros and cons. 

2024-12-20

Cybersecurity Challenges In Managing Learning Centres

Rising Threats: Understanding cyber threats to education centers and how you can leverage secure management systems to counter them.

2024-12-21

Cyber Attacks On Ukraine Government Agencies

Russia launches a mass cyber attack on Ukraine’s Justice Department, plus various state registries and government records offices.

2024-12-23

Quantum Computing Nears A Turning Point

From Promise To Reality: As quantum capabilities evolve, organizations must face the urgent need for quantum-safe solutions. By Tim Callan

2024-12-20

Working With Clients? Take a Good Look At Your Cybersecurity Trends

Remote work offers freedom, but not without risks. Stay ahead of cyber threats with these tips to protect your freelance business and clients.

2024-12-23

A Guide to Understanding Market-Leading Data Storage Solutions

Data storage can be a matter of business survival. Cyber resilience, quick recovery & a robust storage strategy are vital. By Billy Conway

2024-12-20

Cyber Risk & Resilience

Survey: Business leaders in the UK still don't seem to understand the significant potential financial losses if cyber risk is not properly addressed.

2024-12-18

General Motors Writes-Off $5bn On Robot Taxis

Autonomous vehicle technology turns out to be a lot harder than anticipated, as GM withdraws from the market, leaving it to Tesla & Waymo.

2024-12-17

The Proliferation Of Open Source Malware

Sonatype reports a 156% increase in open source malware in 2024, estimating that 50% of unprotected repositories contain open source malware.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

Vanguard Integrity Professionals

Vanguard Integrity Professionals

Vanguard Integrity Professionals is an independent provider of enterprise security software solutions that address complex security and regulatory compliance challenges.

Akin Gump Strauss Hauer & Feld

Akin Gump Strauss Hauer & Feld

Akin is a leading global law firm providing innovative legal services and business solutions to individuals and institutions. Practice areas include Cybersecurity, Privacy and Data Protection.

CIRCL

CIRCL

CIRCL is the national Computer Incident Response Center of Luxembourg

Cast Software

Cast Software

CAST is a pioneer in Software Analysis and Measurement (SAM) to capture and quantify the reliability and security of business applications.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

Bureau Veritas

Bureau Veritas

Bureau Veritas are a world leader in Testing, Inspection and Certification. We provide certification and training services in areas including cybersecurity and data protection.

Polish Centre for Accreditation (PCA)

Polish Centre for Accreditation (PCA)

PCA is the national accreditation body for Poland. The directory of members provides details of organisations offering certification services for ISO 27001.

ArmorText

ArmorText

ArmorText offers a seamless channel for communication and collaboration for organizations concerned with keeping communication data private and secure.

ClearHub

ClearHub

The aim of ClearHub is simple: to give businesses like yours access to the best talent, all screened and technically tested by Clearvision’s expert team.

Symptai Consulting

Symptai Consulting

Symptai Consulting is a leading Cyber Security, Digital Transformation and Anti-Money Laundering firm serving the Caribbean and the wider world.

Kompleye

Kompleye

Kompleye is a recognized cybersecurity and compliance audit organization that offer a comprehensive solution for different industries.

TrustCloud

TrustCloud

TrustCloud is a global company specializing in the orchestration and custody of secure digital transactions including identification, signature, payments, and electronic custody.

Assetnote

Assetnote

The Assetnote platform enables organizations to effectively map and continuously monitor their external attack surface.

Aim Security

Aim Security

Aim empowers enterprises to unlock the full potential of GenAI technology without compromising security. GenAI makes business better - Aim makes GenAI secure.

Backslash Security

Backslash Security

With Backslash, AppSec teams gain visibility into critical risks in their apps based on reachability and exploitability.