News

2024-01-27

Major Data Breach Affects Twitter, LinkedIn & Weibo

Personal data of millions of users at risk after cyber security experts uncovered what some are describing as the biggest data breach of all time.

2024-01-26

The Power Of Unified Cloud Protection

Security Service Edge: A modern approach to business security to improve network performance & protection. By John McLoughlin

2024-01-18

Anonymous Sudan Attack London Internet Facility

Unverified DDoS Atack: Russian affiliated hackers claim they have attacked London's Internet Exchange in response to airstrikes in Yemen.

2024-01-24

Ransom Attackers Impersonate Security Researchers

A New Ransom Exploit: Threat actors pretend to help hacked victims by offering to hack the original ransomware gang and delete the stolen data. 

2024-01-24

Cyber Incidents Are The Biggest Risk To Business

Allianz Insurance Barometer: More than a third of companies surveyed name cyber threats as their biggest risk, ahead of business interruption.

2024-01-23

The British Library Gets Back Online

Eleven weeks after a crippling ransom attack the British Library has partially restored services, although full recovery will take another year.

2024-01-23

Microsoft Is The Most Commonly Used Alias In Phishing Attacks 

Widespread use of AI is leading to a higher volume of phishing campaigns that will be barely distinguishable from genuine company communications.

2024-01-23

Cyber Attacks Hit Three English Councils At Once 

​​​​​​​Hackers have disrupted online operations in the county of Kent, affecting three town councils and taking down multiple online services.

2024-01-22

Hackers Attack Leading Investment Bank

Davos Blues: Bankers & regulators express concern over the growing wave of cyber attacks on financial services being reinforced with AI.

2024-01-22

Open Banking, Security, APIs & Mobile Apps

Open banking aims to improve transparency and drive the development of better financial products & services. But are users' sensitive data secure?

2024-01-19

Five Security Benefits Of Application Mapping

By following the best practices for application mapping, organizations can maximize the security & efficiency of their business operations.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

HDI

HDI

HDI is the worldwide professional association and certification body for the technical service and support industry.

MaxMind

MaxMind

MaxMind is an industry-leading provider of IP intelligence and online fraud detection tools.

Center for Internet Security (CIS)

Center for Internet Security (CIS)

CIS is a nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats.

Insta Group

Insta Group

Insta are a trusted cyber security partner for security-critical companies and organizations.

Picus Security

Picus Security

Huge gaps often exists between the "perceived"​ and "actual"​ IT security level of an organization. Picus Security continuously assesses security controls and reveals deficient ones before hackers do.

Council to Secure the Digital Economy (CSDE)

Council to Secure the Digital Economy (CSDE)

CSDE brings together companies from across the ICT sector to combat increasingly sophisticated and emerging cyber threats through collaborative actions.

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute at Northern Michigan University offers non-degree and industry credentials relevant to emerging careers in cybersecurity.

Voxility

Voxility

Voxility provides Infrastructure-as-a-Service in the biggest Internet hubs in the world.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

NetGain Technologies

NetGain Technologies

NetGain Technologies helps small to medium-sized businesses gain access to expert IT talent. We provide strategies that use technology as a driving force behind business growth.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions (ComUnity, secure and encrypted messaging, detection of interception tools, etc) and cyber defense consultancy service.

Versent

Versent

Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services.

Protos Labs

Protos Labs

Protos Labs enables insurers & enterprises to make better cyber risk decisions through holistic, real-time risk management tools.

TIM Enterprise

TIM Enterprise

TIM Enterprise offers innovative, sustainable and secure 360-degree digital solutions to companies and public administrations.

Scinary Cybersecurity

Scinary Cybersecurity

Scinary was founded in 2015 on the premise that cybersecurity should not be limited to just large corporations or large government entities.