News

2025-03-17

From Static Defenses To Dynamic Systems

Resilience isn’t just about enduring threats - it’s about maintaining the ability to operate and recover under any circumstances. By Engin Kirda

2025-03-17

Medusa Ransomware Attacks Focus On Critical Infrastructure

Double Extortion: Even if the victim organisation can recover their encrypted files, they still face the threat of their sensitive data being leaked.

2025-03-14

Shadow IT In Remote Work

Portable Storage: Businesses that fail to address shadow IT risk losing control of their sensitive data and put themselves at risk. By Jon Fielding

2025-03-17

What Apple's Standoff With The UK Government Means For Your Data

Privacy On The Line: Creating a lawful mechanism for backdoor access means creating risks for everyone else. By Paul Holland

2025-03-16

Continuous Cybersecurity Learning Is Business-Critical

Security has shifted from IT mandate to executive imperative, this is why continuous learning is a business-critical function. By Alexia Pedersen

2025-03-13

Protecting Digital Infrastructure Without Going Broke

A modern, data-driven age requires modern, data-storage infrastructures that protect the interests of our nation's citizens. By Adrian Fern

2025-03-10

Israel’s Emergency Medical Service Attacked

In the latest incident, the long-standing & powerful cyber threat from Iran has been directed against a leading Israeli emergency healthcare provider.

2025-03-11

DOGE Is Undermining US Government Cyber Security

The US Dept. of Government Efficiency has unprecedented access to highly sensitive federal databases & payment tools, with perilous consequences.

2025-03-11

How CISOs Can Demonstrate The Value Of Their Investments

CISOs Face Many Budget Challenges: Key strategies CISOs can adopt to communicate the value of their investments effectively. By Chad LeMaire

2025-03-12

Cyber Attackers Strike X

Update: Dark Storm claim responsibility for the extensive outage on the X social media platform in a well-resourced, co-ordinated attack.

2025-03-10

ZTNA - Back To Basics

Zero Trust Network Architecture: Redefining cybersecurity by treating every user, device & connection as inherently untrustworthy. By Christian Have

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ATSEC Information Security

ATSEC Information Security

ATSEC is an independent, privately-owned company that focuses on providing laboratory and consulting services for information security.

EIT Digital

EIT Digital

EIT Digital is a leading digital innovation and entrepreneurial education organisation driving Europe’s digital transformation. Areas of focus include digital infrastructure and cyber security.

Japan Network Security Association (JNSA)

Japan Network Security Association (JNSA)

JNSA's goal is to promote standardization related to network security and to contribute to greater technological standards in the field.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

CyberSure

CyberSure

CyberSure is a programme of collaborations and exchanges between researchers aimed at developing a framework for creating and managing cyber insurance policy for cyber systems.

DAkkS

DAkkS

DAkkS is the national accreditation body for Germany. The directory of members provides details of organisations offering certification services for ISO 27001.

Dutch Accreditation Council (RvA)

Dutch Accreditation Council (RvA)

RvA is the national accreditation body for the Netherlands. The directory of members provides details of organisations offering certification services for ISO 27001.

Hunter Strategy

Hunter Strategy

Hunter Strategy focuses on delivering solutions that are concise, scalable, and target our customer’s complex technical challenges.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

Secret Intelligence Service (SIS - MI6)

Secret Intelligence Service (SIS - MI6)

The UK’s Secret Intelligence Service, also known as MI6, has three core aims: stopping terrorism, disrupting the activity of hostile states, and giving the UK a cyber advantage.

SecurEyes

SecurEyes

SecurEyes is a leading cybersecurity firm that provides specialised services, including cybersecurity assessments, managed services, and governance risk and compliance services.

OSP Cyber Academy

OSP Cyber Academy

OSP Cyber Academy are a managed service provider of cyber, information security and data protection training.

Strategic Technology Solutions (STS)

Strategic Technology Solutions (STS)

Strategic Technology Solutions specialize in providing Cybersecurity and Managed IT Services to the legal industry.

Aegis Cyber Defense Systems

Aegis Cyber Defense Systems

AEGIS is a powerful cybersecurity tool that can help protect your devices and networks from cyber threats, and increase performance.

Applied Insight

Applied Insight

Applied Insight work closely with government agencies and industry to overcome technical and cultural hurdles to innovation, empowering them with the latest cloud, data and cyber capabilities.

Permiso Security

Permiso Security

Permiso combines industry leading Identity Security Posture Management with Identity Threat Detection and Response, leaving no place to hide for identity threats lurking in your environment.