News

2024-08-22

Judge Uses ChatGPT As A Source For Court Verdict

A lower court judge in the Netherlands asked an AI chatbot about the average life span of a solar panels, using the answer it generated in his verdict. 

2024-08-22

How Can You Scan Your Mac For Existing Malware?

Macs have a great reputation, but users need to take steps to identify potentially dangerous malware that might steal their identity & delete files.

2024-08-23

WhatsApp Is A Vehicle For Illegal Content

Encrypted Child Sexual Abuse Imagery: A conflict between the need for enforceable child protection measures and rights to user privacy.

2024-08-22

Threat Intelligence: Most Prevalent Malware Rankings

The Usual Suspects: The top Malware families, exploited Vulnerabilities, mobile Malwares, Ransomware groups and attacked industry sectors.

2024-08-20

APT42: Iranian Hackers At Work

State-sponsored hackers from Iran are busy ramping up targeted phishing campaigns and fake news operations to undermine the US elections.

2024-08-20

North Korean IT Contractor Fraud

Laptop Farming: North Korean IT workers were logging on to work from locations in China, while appearing to be contractors located in the US.

2024-08-20

Quantum Computing Security Could Solve The Data Sovereignty Challenge

What can organisations do to ensure their data processing remains on the right side of the law when managing data sovereignty? By Adrian Fern

2024-08-17

A New Microsoft Vulnerability Warning

Just a month after the Crowdstrike incident, another vulnerability has been found in Windows that can result in the 'Blue Screen of Death' error.

2024-08-19

Five Critical Security Benefits Of CIAM

Customer Identity & Access Management: A system to manage the identity & access requirements of customers interacting with digital services.

2024-08-16

Revolutionizing Legal Research & Document Analysis With RAG Technology

Retrieval-Augmented Generation: An AI-driven technology is reshaping the legal industry by enhancing efficiency, accuracy, & depth of legal work.

2024-08-19

Cyber Insurance: The Cost Of Doing Business

Ransom Attacks & Extortion Demands Are Soaring: The question for any company is what would you pay and what does it cost to defend yourself?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Synopsys

Synopsys

Synopsys delivers trusted and comprehensive silicon to systems design solutions, from electronic design automation to silicon IP and system verification and validation.

CyberSmart

CyberSmart

CyberSmart is a platform that allows you to maintain compliance, achieve certification and secure your organisation.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

Guardian360

Guardian360

The Guardian360 platform offers unrivalled insight into the security of your applications and IT infrastructure.

Certus Software

Certus Software

Our Secure Data Erasure solutions protect customer data confidentiality by completely erasing it from data storage devices.

Swiss Re

Swiss Re

Swiss Re Group is a leading wholesale provider of reinsurance, insurance and other insurance-based forms of risk transfer including cyber risk.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

CyberSec.sk (CSSk)

CyberSec.sk (CSSk)

CyberSec.sk is the Slovak portal bringing the latest cyber security news, politics, tips and instructions on how to protect the internet.

Clari5

Clari5

Clari5 redefines real-time, cross channel banking Enterprise Fraud Management using a central nervous system approach to fight financial crime.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

CybExer Technologies

CybExer Technologies

CybExer provide an on-premise, easily deployable solution for complex technical cyber security exercises based on experience in military grade ranges.

Trusona

Trusona

Trusona is a pioneer and leader in passwordless two-factor authentication (2FA).

Estio Training

Estio Training

Estio Training is a specialist digital and IT apprenticeships provider, dedicated to introducing new skills and developing existing talent in businesses across the UK.

Invicti Security

Invicti Security

Invicti Security is an AppSec leader transforming the way web applications are secured.

SphereX Technologies

SphereX Technologies

SphereX is the first on-chain security solution for Web3 applications.

Amplix

Amplix

In the race to create value for your enterprise, Amplix is your best asset for making technology decisions and optimizing your IT infrastructure, cloud usage, and security posture.