News

2024-05-20

A Critical Vulnerability In The Post-PSTIA Era 

The Human Factor: To truly fortify our cybersecurity in this new era, we must address the elephant in the room. By James O'Sullivan

2024-05-16

A Way To Build A Comprehensive Backup Strategy 

Jira Backup Best Practices: Organizations that implement these practices improve task accessibility & guarantee quick recovery with a few clicks.

2024-05-17

Christie's Auctions Knocked Offline

Spring Sales: The prestigious art auction house has suffered a systems outage affecting forthcoming sales of items worth many $millions.

2024-05-15

XZ Utils: A Fable on Proactive Risk Management

The recent attack on the XZ compression tool shows how important it is for companies to manage risks in their open-source software. By Ilkka Turunen

2024-05-10

Overcome PDF Conversion Challenges: A Step-by-Step Guide

Navigating PDF Conversion Challenges: Explore common issues and discover top tools for accurate and seamless conversions. 

2024-05-15

The Ransomware Arms Race

How Can Organisations Stay Ahead?: Seven cybersecurity experts give their insights into how organisations can tackle this relentless threat. 

2024-05-13

Cyber Attacks On The British Education Sector Trending

British education has been a prime target for years and recent data confirms that the sector is not keeping up with current attack techniques. 

2024-05-13

Dell Hacked - 49m Customers Exposed 

Menelik At Work: If you have been a Dell customer in the past seven years, it’s likely that your customer data is on the Dark Web now.

2024-05-13

Stolen NHS Data Published On The Dark Web

Extortion: More than 1TB of sensitive patient and staff data has been made available for download, with a threat to release a further 3TB.

2024-05-10

Mobile Gambling - Sportsbooks Face Growing Fraud

Risk & Return: Mobile betting App users face a growing threat from fraud and their operators should take steps to protect them. By Elie Shuggi

2024-05-10

LockBit Resurrection

LockBit’s official Dark Net website is reactivated by law enforcement as the Russian gang leader is identified as Dmitry Khoroshev.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Secunet Security Networks

Secunet Security Networks

Secunet is a leading cyber security company offering a combination of consultancy and products, delivering the highest level of security for data, applications and digital identities.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

AET Europe

AET Europe

AET Europe is specialised in creating technological solutions for user identification and authentication.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

Founder Shield

Founder Shield

Founder Shield is a data driven insurance brokerage focused excusively on rapidly evolving high-growth companies.

YouWipe

YouWipe

Scandinavian Data Erasure Leader YouWipe is the number one choice of European Ministries, European Central Banks, Swiss Pharmaceuticals and Major Electronics Retail Chains.

IQ4 - Cybersecurity Workforce Alliance (CWA)

IQ4 - Cybersecurity Workforce Alliance (CWA)

Cybersecurity Workforce Alliance, a division of iQ4, is an organization comprised of a diverse range of professionals dedicated to the development of the cybersecurity workforce.

Xperience

Xperience

Xperience solves our clients’ toughest challenges by delivering business efficiency through digital transformation solutions across cloud, managed IT, CRM and ERP.

Phished

Phished

Phished is an AI-driven platform that focuses on the human side of cybersecurity. By combining fully automated training software with personalised, realistic simulations of cyberattacks.

MoogleLabs

MoogleLabs

MoogleLabs leverage AI/ML, Blockchain, DevOps, and Data Science to come up with the best solutions for diverse businesses.

Peris.ai

Peris.ai

Peris.ai is a cybersecurity as a service startup that protects businesses and organizations from online threats.

Redcoat AI

Redcoat AI

Redcoat AI provide a comprehensive security platform that continuously evolves with the threats and opportunities presented by AI.

NopalCyber

NopalCyber

NopalCyber makes cybersecurity manageable, affordable, reliable, and powerful for companies that need to be resilient and compliant.

Black Cipher Security

Black Cipher Security

Black Cipher is a New Jersey-based cybersecurity and incident response consulting firm.

Leapfrog Services

Leapfrog Services

Leapfrog offers outsourced managed IT + cybersecurity services that are scalable, aligned, and fit easily into your business model.