News

2024-11-01

Increase Security For Your Enterprise Cloud With A Next-Generation Firewall

AWS Webinar: Hear security experts break down myths and realities of next-generation firewalls, how to use them & how to boost your security posture.

2024-11-01

Are Businesses Adopting A ‘Titanic Mindset’ To Data Recovery?

Sinking Feeling: One in five UK companies test their data recovery systems just once a year. Only 5% say they test monthly. By Stephen Young

2024-10-31

Preparing IT Teams For The Next AI Wave

The growing importance of AI has created a compelling reason for IT departments to address risk and compliance with renewed urgency.

2024-11-01

Cyber Security Teams Feel The Pressure 

Understaffed, Overworked & Underfunded: Cyber security teams are also suffering from major skills gaps and a shortage of well- trained people.

2024-10-31

2024 US Presidential Election Cyber Intrusion: Part 5 - Cybercrime Threats

USA 2024 Elections: With the polls even, what is the potential for collaboration between Nation State Actors & Cybercrime Groups? By Craig Watt ​​​​​​​

2024-10-31

What Industrial Organisations Can Learn From Nation-State Cyber Attacks

Risk Management: Often conceived without cybersecurity in mind, many industrial devices lack basic security measures and controls. By Edgardo Moreno

2024-10-30

Trump Campaign A Target For Attacks From China

Salt Typhoon: A Chinese cyber espionage group is identified as responsible for attacks on telephone networks used by both US Presidential candidates.

2024-10-30

Making Insider Threats A Year Round Priority

The Danger Within: The biggest risk to an organization's cyber security comes from the inside - and that needs to be a top priority all year round.

2024-10-30

How Do The UK Cyber Security & Resilience Bill & The EU's NIS2 Compare?

Business operating in both regimes can expect to have to meet both UK & EU regulations and so will need to seek harmonization. by Innes Muir

2024-10-25

What Security Teams Need To Know About The EU’s NIS 2 Directive

Act Now: The NIS 2 Directive brings significant changes and increased obligations for organizations across the EU & beyond. By Graham Rance

2024-10-29

GenAI Is The Biggest Cyber Security Risk

A Growing Arms Race: Nearly half of security professionals think Artificial Intelligence is the most significant security risk to their organization. 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

KPMG

KPMG

KPMG s a leading provider of professional services including information technology and cyber security consulting.

TCN

TCN

TCN is an advanced System Integrator and Infrastructure Company in Albania.

CMMI Institute

CMMI Institute

CMMI Institute enables organizations to elevate and benchmark performance across a range of critical business capabilities, including product development, data management and cybersecurity.

Attack Research

Attack Research

We go far beyond standard tools and scripted tests. Find out if your network or technology can stand real-world and dedicated attackers.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Krista Software

Krista Software

Krista is an intelligent automation platform that combines iPaaS and Conversational AI to automate complete business processes across your teams and apps.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

BAE Systems

BAE Systems

BAE Systems develop, engineer, manufacture, and support products and systems to deliver military capability, protect national security, and keep critical information and infrastructure secure.

ASPIA InfoTech

ASPIA InfoTech

ASPIA Infotech is a leading Information and cybersecurity organization focused on innovative approaches to avert targeted attacks.

Options Technology

Options Technology

Options is a global leader in financial technology, specialising in Capital Markets technology and enterprise-grade solutions.

Cork

Cork

Cork is a purpose-built cyber warranty company for managed service providers (MSPs) serving small businesses (SMBs) and the software solutions they manage.

Qi An Xin (QAX)

Qi An Xin (QAX)

QAX is a listed company based in China, and a leader in cybersecurity industry, providing new generation enterprise-level and national-level cybersecurity solutions.

LiveAction

LiveAction

LiveAction’s Network Intelligence platform transforms complex data into actionable insights, providing organizations with a comprehensive view of their network.