News

2024-11-05

Social Media Algorithms & Their Effects [extract]

Algorithms analyse previous behaviour, using past interactions to predict and suggest content that aligns with individual user interests.

2024-11-05

Social Media Algorithms & Their Effects

Algorithms analyse previous behaviour, using past interactions to predict and suggest content that aligns with individual user interests.

2024-11-05

Generating Competitive Advantage Through Compliance

Managing cyber risk is a powerful business enabler, helping businesses to become more efficient and more competitive. By James Eason

2024-11-05

Safeguarding Your Business: 10 Best Practices For Mobile Device Safety

Smartphones, tablets and laptops are essential for communication, data access & collaboration but are equally attractive targets for cyberattacks.

2024-11-04

To Lead In AI, Governments Need To Invest In Large-Scale GPU Clusters

The US government needs to move fast to build new computing infrastructure if it is to keep pace with AI research & the related economic benefits.

2024-10-30

Eight Updated Smartphone Security Hacks For 2025

Your smartphone isn’t just a device - it’s a digital vault. Keeping your mobile device secure is essential but doesn’t need to be complicated.

2024-11-04

The US Has A New AI Strategy 

As the Biden Presidency fades, the White House has issued a comprehensive new plan to harness Artificial Intelligence for national security.

2024-11-04

Russian Hackers Attack British Local Government 

A campaign of attacks on local councils is thought to be one part of Russia’s response to the UK’s growing involvement in the Ukraine war.

2024-10-31

The Developer’s Guide To Preventing Data Leaks & Breaches In Software

With the level of cyber threats so advanced, any weak spots in the code may result in exposed sensitive data & significant financial losses.

2024-11-03

X Is A Vehicle For Political Propaganda

Critics claim the platform is being used to promote politically motivated messages, including conspiracy theories, which are essentially propaganda.

2024-10-29

Google Urges Windows Users To Update Chrome Amid New Security Threats

Urgent Alert: When you keep your software updated it makes you safer online, improves your experience, and protects your important data.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

SecureAuth

SecureAuth

SecureAuth delivers cutting edge identity and information security solutions for cloud, mobile, web, and VPN systems.

Kudelski Security

Kudelski Security

Kudelski Security is an international cybersecurity company providing innovative, independent and tailored security solutions for large enterprise and public sector clients.

OmniNet

OmniNet

OmniNet delivers the next generation of cybersecurity and is the only provider in the market to move the edge of small businesses to a virtual, omnipresent perimeter.

Nexusguard

Nexusguard

Nexusguard is at the forefront of the fight against malicious Internet attacks, protecting organizations worldwide from threats to their websites, services, and reputations.

OGiTiX

OGiTiX

OGiTiX Software AG is a German software manufacturer specializing in Identity and Access Management.

th4ts3cur1ty.company

th4ts3cur1ty.company

th4ts3cur1ty.company specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers.

NJVC

NJVC

NJVC delivers IT automation, optimization and security to empower mission-enabling IT for customers with secure requirements.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

StoneLock

StoneLock

StoneLock is a trusted leader in the design and manufacture of facial recognition software and technology.

Enzoic

Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection.

Seadot Cybersecurity

Seadot Cybersecurity

Seadot offer cybersecurity services to organizations with a high demand for regulatory compliance and security.

Rubrik

Rubrik

Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance.

Onyxia Cyber

Onyxia Cyber

Onyxia's unique dynamic cybersecurity platform identifies gaps and prioritizes recommendations for proactive cybersecurity strategy, performance, remediation and management.

EdgeWatch

EdgeWatch

EdgeWatch is a platform that helps information accredited security practitioners discover, monitor, and analyze devices that are accessible from the Internet.

Foresiet

Foresiet

Foresiet is the first platform to cover all of your digital risks, allowing enterprise to focus on the core business.

Intracis

Intracis

Intracis is a 'Made in India' cyber incident management solution aimed at ‘Making Security Simple’ by simplifying cyber incident management for CERTS and CSIRTS.