News

2024-07-18

Defending Against Business Email Compromise

Detection Strategies: Going beyond traditional measures to block malicious emails before they reach employees. By Mike Britton

2024-07-19

Large-Scale IT Outage Causing International Disruption

Supply Chain Incident: Services in multiple countries are affected. Airlines, government agencies, banks, telecoms & media outlets in chaos.

2024-07-18

Are Any Of Your Suppliers A Security Risk Waiting To Happen?

Organisations are only as strong as the weakest link in their supply chain. Avoiding risky 3rd-party vendors & suppliers is vital. By Manuel Sanchez

2024-07-17

Warnings Over Cyber Security At The Paris Olympics

Security experts warning of a tenfold increase in cyber attacks ahead of the summer Olympic Games, which commence on 26th July.

2024-07-16

The Top Nine API Security Vulnerabilities

Understanding common API vulnerabilities, how cybercriminals are targeting them, and what you can do to prevent them. By Marco Palladino

2024-07-16

Self-Regulation In The Email Provider Market

A New Chapter For Cybersecurity: DMARC enhances email security, reducing phishing & other email-based attacks. By Gerasim Hovhannisyan

2024-07-16

Google Will Pay $23B To Acquire Cyber Security Firm Wiz

Google's parent company Alphabet is in advanced talks with the aim of acquiring the cyber security firm Wiz, for an astonishing price $23 billion. 

2024-07-16

Data Belonging To 110m AT&T Customers Stolen

Undetected For Two Years: AT&T has confirmed that the records of calls and texts of 110 million wireless customers have been stolen.

2024-07-12

Ransomware Attack Hits Global Card Processing Company

TPS Worldwide, a Pakistani card processing company that provides services to numerous financial institutions, is facing a massive ransom attack.

2024-07-12

Warning - APT40 Espionage Group At Work

Genuine & Increasing Risk: Western government security agencies issue a joint advisory about the Chinese cyber spies known as APT40.

2024-07-12

Human Error - The Weakest Point In Cyber Security 

In a survey, 74% of CISOs report human error to be perceived as the weakest point and the most significant vulnerability in cybersecurity.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Lynx Software Technologies

Lynx Software Technologies

Lynx provide secure software and operating systems for use in mission critical applications such as aerospace, medical, transportation and IoT.

Shadowserver Foundation

Shadowserver Foundation

Shadowserver Foundation aims to improve internet security by raising awareness of compromised servers, malicious attackers and the spread of malware.

EMnify

EMnify

EMnify is a Software-as-a-Service (SaaS) company, revolutionizing cellular Internet of Things (IoT).

ACROS Security

ACROS Security

ACROS Security is a leading provider of security research, real penetration testing and code review for customers with the highest security requirements.

Drootoo

Drootoo

Drootoo is transforming businesses and making them high performing entities with its unified cloud platform.

QI ANXIN Technology Group

QI ANXIN Technology Group

QI ANXIN specializes in serving the cybersecurity market by offering next generation enterprise-class cybersecurity products and services to government and businesses.

ACA Group

ACA Group

ACA Group are a leading governance, risk, and compliance (GRC) advisor in financial services.

New Net Technologies (NNT)

New Net Technologies (NNT)

NNT SecureOps provides ultimate protection against all forms of cyberattack and data breaches by automating the essential security controls.

Cythereal

Cythereal

Cythereal is the leader in predicting and preventing advanced malware attacks. Security Automation for the Overwhelmed Administrator.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Perygee

Perygee

Perygee is a fully integrated platform for operational security. Companies depend on Perygee to identify and streamline the most important security practices for their operations.

MainNerve

MainNerve

MainNerve helps secure networks, applications, people, and facilities… enabling businesses to reduce risk and increase their cybersecurity posture.

Dig Security

Dig Security

Dig Security offers the first data detection and response (DDR) solution, providing real-time visibility, control and protection of your data assets across any cloud.

BAE Systems

BAE Systems

BAE Systems develop, engineer, manufacture, and support products and systems to deliver military capability, protect national security, and keep critical information and infrastructure secure.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

Interlock

Interlock

Interlock are building blockchain-based security products that solve legacy web2 security issues - phishing and social engineering.