News

2024-09-26

US Congress Hit By Cyber Attack

Over 3,000 congressional staffers have had personal information leaked across the Dark Web, in a wide-ranging cyber-attack on the US Capitol.

2024-10-14

CISOs Guide To Compliance & Cyber Hygiene 

Back To Basics: The key concern is to make sure the organisation has the right mechanisms to mitigate risks. By Michael Covington

2024-10-14

A Landmark Ransom Attack On Healthcare

$2.3 Billion In Costs: What one of the worst attacks to ever hit the US healthcare industry can teach us about cybersecurity in 2024. By Claud Bilbao

2024-10-17

2024 US Presidential Election Cyber Intrusion: Part 3 - Hostile Nation State Actors

Complex nation state-level activity involving the deployment of intrusive attack vectors, influence campaigns & hybrid threats combining both.

2024-10-09

2024 US Presidential Election Cyber Intrusion: Part 2 - Covert Influence Operations

USA 2024 Elections: Hostile nation pose a serious foreign influence threat, sowing discord & division amongst US citizens.. By Craig Watt 

2024-09-26

A Critical Flaw Exposing Google Cloud Servers

CloudImposer: The flaw could potentially expose millions of servers operating on Google Cloud Platform to Remote Code Execution attacks. 

2024-10-04

Cyber Insurance: What Businesses Need To Know

A Crucial Safety Net Gets More Expensive: As ransomware incidents have surged, so too have the premiums for cyber insurance. By Greg Day

2024-10-11

Advances In Recognising Deepfakes

Detecting AI-generated content is becoming increasingly difficult. This has significant implications, like deciding if evidence is real or not.

2024-10-11

Surge In DDoS Attacks On Financial Services

Network Layers 3 & 4: Financial services continues to be the most frequently targeted industry with DDoS attacks for the second year running.

2024-10-10

Improving Cyber Security With AI

Turning Information Into Intelligence: AI becomes more intelligent the more it’s used, understanding a company’s unique environment.

2024-10-09

Conspiracy - Reducing Fake News & Disinformation

AI Chatbot Of Truth: Widespread belief in unsubstantiated conspiracy theories is a major source of public concern and a focus of scholarly research.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Remediant

Remediant

Remediant is the leader in Precision Privileged Access Management. We protect organizations from ransomware and data theft via stolen credentials and lateral movement.

Synack

Synack

Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners.

Terranova Security

Terranova Security

Terranova is dedicated to providing information security awareness programs customized to your internal policies and procedures.

CyberCube

CyberCube

CyberCube provide world-leading cyber risk analytics for the cyber insurance market.

NexGenT

NexGenT

NexGenT have combined military-style training with decades of network engineering and cyber security experience into an immersive program to get people into cyber security fast and effectively.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

Comparitech

Comparitech

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware.

Electrosoft Services

Electrosoft Services

Electrosoft provide mature, innovative technology-based services and solutions to power critical IT programs and keep our nation safe from cybersecurity attacks.

Ruptura InfoSecurity

Ruptura InfoSecurity

Ruptura InfoSecurity provide CREST Accredited Penetration Testing & Offensive Security Services. We secure your critical assets through targeted and research driven penetration testing.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

RealDefense

RealDefense

RealDefense develops and markets various privacy, security and optimization technologies and services for consumers and small businesses.

DataStealth

DataStealth

DataStealth is a data protection platform that allows organizations to discover, classify, and protect their most sensitive data and documents.

SUCCESS Computer Consulting

SUCCESS Computer Consulting

SUCCESS Computer Consulting is a leader in managed IT and security services for small and medium-sized businesses in Minneapolis, St. Paul, and the surrounding Twin Cities Metro area.

Koop

Koop

Koop’s trust management platform helps navigate the complexities of regulatory compliance, security reviews, and liability insurance in a single place.