News

2024-11-29

How AI Is Reshaping The Cybersecurity Landscape 

ChatGPT Turns Two: Generative AI has revolutionised countless industries, including cybersecurity. A discussion with Alex Rice & Darren Thomson.

2024-11-27

Cybersecurity Essentials For Laptop Gamers

Understanding the basics of cybersecurity for laptop gamers allows you to enjoy online gaming without fear of a compromised device & stolen identity.

2024-11-29

From Credentials To Identity: Understanding Digital Identity & Access

Proactive security strategies, continuous monitoring & education are key to combat the threat of credential misuse & identity theft. By Ford Merril

2024-11-27

Russian State-Sponsored Hacking Extends Worldwide

A damaging Russian espionage campaign has been striking government agencies and other institutions in Central Asia, Ukraine & NATO members.

2024-11-27

Meta Deletes 2 Million Fake Social Media Accounts 

Meta has deployed a range of measures to detect and stop fraud across its platforms, including Facebook, Instagram, WhatsApp & Messenger.

2024-11-26

What The US’s Foggy AI Regulations Mean For Today’s Cyber Compliance

The US government's regulatory inclination to let AI developers do their own thing is a growing concern for the vast majority of businesses.

2024-11-26

The Problem With Generative AI - Leaky Data

Confidential computing allows data to be input into a Gen- AI model and the data to be securely processed without leaking. By Samuel Tourbot

2024-11-23

Phishing Scheme That Generated $11M Taken Down

Scattered Spider: Charges of using text messages to extract victims' personal information as a gateway to steal millions in crypto currency.

2024-11-25

Hackers Steal $10M Via LinkedIn

North Korean hackers masquerading as recruiters for high profile financial services firms using LinkedIn to contact prospective targets.

2024-11-26

Cyber Attacks On Britain's Water Supply

Across critical national infrastructure sectors, more incidents have been reported this year than ever, with drinking water one of the most affected.

2024-11-26

Taking The You Out Of USB

How Businesses Can Reduce Risk: USBs are a particular concern for air gapped networks where defence relies on segregation.  By Jon Fielding

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

National Trading Standards eCrime Team (NTSeCT) - United Kingdom

National Trading Standards eCrime Team (NTSeCT) - United Kingdom

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

H3C Group

H3C Group

H3C provides a full range of Computer, Storage, Networking and Security solutions.

Belkasoft

Belkasoft

Belkasoft is a software vendor providing public agencies, corporate security teams, and private investigators with digital forensic solutions.

Aptiv

Aptiv

Aptiv is a global technology company that develops safer, greener and more connected solutions enabling the future of mobility.

S2S Group

S2S Group

S2S Group specialise in the destruction and management of IT assets at the end of the lifecycle.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

KDM Analytics

KDM Analytics

KDM Analytics software products automate the NIST risk management framework (RMF) assessment for operational technology (OT) systems.

SafeCipher

SafeCipher

At SafeCipher, we pride ourselves on being your single vendor-neutral resource for navigating the complexities of cryptographic data encryption.

Vulcan Cyber

Vulcan Cyber

At Vulcan, we’re modernizing the way enterprises reduce their cyber risk. From detection to resolution, we automate and orchestrate the vulnerability remediation process dynamically and at scale.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

Perygee

Perygee

Perygee is a fully integrated platform for operational security. Companies depend on Perygee to identify and streamline the most important security practices for their operations.

Jot Digital

Jot Digital

Jot Digital is a full-service technology company specializing in digital engineering, application modernization and business transformation.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.

Boo Consulting

Boo Consulting

Boo Consulting is a trusted privacy and risk consultancy firm. We are driven to help you find an appropriate solution that will suit your budget and requirements.

CR Group

CR Group

CR Group is a Swedish-owned, cyber-security company oriented towards the European market. We offer solutions for vital societal functions that are both easy-to-buy and easy-to-use.