News

2024-09-23

Criminal Communication App Taken Down

Australian police have infiltrated Ghost, an encrypted global communications app developed for criminals, leading to dozens of arrests.

2024-09-26

AI-Powered Translation: A Bridge Between IT & Business

AI-powered translation can break down language barriers, particularly when it comes to translating complex technological jargon. By Paul Maksimovic 

2024-09-24

British Security Agency Accuses Russian Military Of Cyber Sabotage 

Unit 29155: The Russian military has been undertaking computer network operations for the purposes of espionage, sabotage & reputational harm.

2024-09-24

International Agreement To Regulate Artificial Intelligence

Britain Signs First International AI Treaty: The signatories commit to collective action to manage AI products & prevent its potential misuse.

2024-09-25

New Exploits & Examples Of Online Fraud

Communication with retailers via social media and online can be convenient, but customers are vulnerable to fake accounts used to steal their money.

2024-09-20

Iran Pays $Mulitmillion Ransom To Protect Its Banks

Iran’s government pushed for the ransom to be paid, fearing instability of the country’s weak financial system, which is under intense pressure.

2024-09-17

US Healthcare Firm Loses 22GB of Data

Stolen & Leaked: The 3AM Ransomware group is claiming responsibility for stealing the Personal Health Information of 464,000 patients.

2024-09-30

Space: The Last Cybersecurity Frontier?

Space is a growing part of national critical infrastructures, with commercial spacecraft & military communications at risk of being badly compromised.

2024-09-18

Britain Convenes An International Cyber Skills Conference

Protection & Defence: Britain is bringing western countries together to discuss the cyber security threats that face nations around the world.

2024-09-18

Meta Bans Russian Media From Facebook

Meta is banning Russian state media networks, saying that they carry out influence operations and evade detection on its social media platforms. 

2024-09-23

Combating Cyber Attacks With Threat Intelligence 

Navigating Cybersecurity: Threat intelligence has a key role in reducing risks and can be integrated with other tools to reach better solutions.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

CORDIS

CORDIS

CORDIS is the European Commission's primary public repository and portal to disseminate information on all EU-funded research projects and their results.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

Wynyard Group

Wynyard Group

Wynyard Group is a niche, technology-driven company specializing in Integrated Border Security solutions for enhanced public safety.

FraudWatch International

FraudWatch International

FraudWatch has been protecting client brands around the world since 2003, and are the leaders in online brand protection from phishing, malware, social media and mobile apps impersonation.

Viakoo

Viakoo

Viakoo is an Enterprise IoT Applications Management company providing performance, security, and compliance. Viakoo enables you to be proactive in maintaining cyber hygiene and protecting your network

Probity

Probity

Probity Inc. is a certified software development and systems engineering company, providing support to federal government and national defense related clients.

KnoTra Global

KnoTra Global

KnoTra Global is a next-generation Managed Service provider with a portfolio of services including Cybersecurity Solutions, Network Management, IT Leadership, and Day-to-Day Helpdesk and IT services.

North Green Security

North Green Security

North Green Security is a UK-based cyber security training and consultancy company.

Google Safety Engineering Center (GSEC)

Google Safety Engineering Center (GSEC)

GSEC Málaga is an international cybersecurity hub where Google experts work to understand the cyber threat landscape and to create tools that keep users around the world safer online.

Longbow Security

Longbow Security

Longbow automates root cause for your application and cloud risks, enabling teams with intelligent remediation actions that reduce the most risk with the least effort.

Revytech

Revytech

Revytech is a tech company providing services in a broad range of areas including IT operations, cyber security and network engineering.

BestDefense

BestDefense

BestDefense offers proactive cybersecurity solutions that adapt in real-time to outpace evolving threats and ensure resilient protection for your critical assets.