News

2025-03-10

The Shadow IT Problem No One Talks About

To avoid exposure to breaches & compliance failures, organisations need a proactive approach to simplifying network complexity. By David Brown

2025-03-09

Data Breaches Cause A Financial Burden

A Multi-Faceted Approach: Risk leaders identify data breaches as a leading source of man-made disruptions causing financial burdens.

2025-03-06

Chinese Hackers Indicted

US Treasury Breach: Dept. of Justice prosecutors have charged 12 Chinese nationals for being part of an alleged hacking campaign.

2025-03-05

Apple Takes Legal Action Over Data Privacy

Investigatory Powers Tribunal: Apple is taking legal action over the UK government efforts to force the company to weaken iCloud encryption.

2025-03-04

The Urgency Of AI Governance

Rapid Adoption Of AI-Driven Solutions: The lack of proper AI governance exposes businesses to financial, regulatory & reputational risks.

2025-03-03

Frontend vs Backend vs Full Stack: What’s The Difference?

Full-stack, Backend & Frontend: How does a full stack development company employ each of these skill sets to build seamless digital experiences?

2025-03-03

Cyber Command Ordered To Cease Hacking Russia

Defence Secretary Pete Hegseth has ordered the US military to pause offensive cyber operations against Russian targets.

2025-03-03

President Trump Says Russia Is Not A Cyber Threat

Trump has publicly & privately said that he does not believe Russia presents a cyber threat to US national security or critical infrastructure.

2025-03-03

Obsolete: Skype To Shut Down

The video calling service Skype will close on May 14th 2025, its owner Microsoft has said.

2025-03-04

Orange Group Hacked - User Data Stolen

The alleged breach includes source code, client contracts, project blueprints, and user data, risking operational security & customer privacy.

2025-03-09

Russian Hackers Penetrate Ukrainian Signal Accounts

Russian hackers have found ways to connect their victims' accounts to their own devices by abusing the messaging app's linked devices.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

KPMG

KPMG

KPMG s a leading provider of professional services including information technology and cyber security consulting.

Claroty

Claroty

Claroty was conceived to secure and optimize OT networks that run the world’s most critical infrastructures.

National Intelligence Service (NIS) - South Korea

National Intelligence Service (NIS) - South Korea

The NIS oversees policy on cyber security in South Korea by formulating and coordinating the execution of such policy and devising necessary schemes and guidelines.

Exostar

Exostar

Exostar is the cloud platform of choice for secure enterprise and supply chain collaboration solutions and identity and access management expertise.

Kobil Systems

Kobil Systems

Kobil is a pioneer in the fields of smart card, one-time password, authentication and cryptography.

Kippeo Technologies

Kippeo Technologies

Kippeo is a security systems integrator providing innovative solutions that look at all the parameters and connect all the dots.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

The Cyber AB

The Cyber AB

The Cyber AB is the official accreditation body of the Cybersecurity Maturity Model Certification (CMMC) Ecosystem.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

Abu Dhabi Gov Digital

Abu Dhabi Gov Digital

Gov Digital (formerly Abu Dhabi Digital Authority - ADDA) enable, support and deliver a digital government that is proactive, personalised, collaborative and secure.

Cybaverse

Cybaverse

Cybaverse (formerly North Star Cyber Security) was founded to create the perfect blend of a Managed Security Service Provider (MSSP) and a Cyber Security Consultancy in one.

Nemstar

Nemstar

Nemstar is a specialist in Information Security & Cyber Training with over 25 years' industry experience.

Amazon Web Services (AWS)

Amazon Web Services (AWS)

Amazon Web Services is the world’s most comprehensive and broadly adopted cloud platform, offering fully featured services from data centers globally.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.

Yondu

Yondu

Yondu empowers businesses across various industries through a wide array of innovative technology solutions to help them scale in the new digital economy.