BUSINESS > Production > Manufacturing


« Back to News

2025-02-12

NATO Technology Partner Expands UK Operation

Goldilock: British manufacturing business grows fast to supply demand for its network isolation technology, used to secure critical infrastructure.

2025-02-03

British Engineering Company Attacked

Reputational Damage: Smiths Group's stock price dropped following disclosure of a cyber security incident that has affected its systems worldwide.

2025-02-01

Multiple Cyber Security Problems For Manufacturers 

Manufacturers are prioritizing improved cyber security, but failing to tackle network infrastructure issues can restrict progress. By Renuka Nadkarni

2024-12-13

Speciality Bakery Chain Hacked 

Krispy Kreme Donuts: A major cyber attack disrupted systems which resulted in lost production at the leading specialist bakery and retail outlet.

2024-11-20

The Industries Facing The Biggest Cyber Threats

Understanding the sectors most frequently targeted by cybercriminals can offer insights into the breadth & nature of these threats. By John McLoughlin

2024-10-31

What Industrial Organisations Can Learn From Nation-State Cyber Attacks

Risk Management: Often conceived without cybersecurity in mind, many industrial devices lack basic security measures and controls. By Edgardo Moreno

2024-07-19

Semiconductor Manufacturing Companies Stocks Fall

The soaring share prices of the makers of advanced semiconductors has crashed following statements from Donald Trump & the US government.

2024-06-25

How To Effectively Detect & Prevent SAP Threats

Porous Entry Points: SAP systems contain IT-enabled or overlooked vulnerabilities which leave them open to exploitation. By Christoph Nagy

2024-06-20

Industrial Operating Technology Faces An Urgent Challenge

Major cybersecurity agencies have issued an “urgent warning” on industrial cybersecurity - and how organisations can heed it. By Edgardo Moreno

2024-05-08

Securing Critical Infrastructure

Bridging the Gap In OT Cybersecurity Governance: NIS2 compliance is vital to improving critical infrastructure resilience. By Gareth Pritchard

2024-05-01

Volkswagen Hacked, Critical Data Stolen

Thousands of documents about research in engine & electric vehicle technology were exfiltrated, going undetected for at least five years.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Vaddy

Vaddy

Vaddy provide an automatic web vulnerability scanner for DevOps that performs robust security checks to ensure that web app code is secure.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

Expanse

Expanse

Expanse SaaS-delivered products plus service expertise reduce your internet edge risk to prevent breaches and successful attacks.

Trustless Computing Association (TCA)

Trustless Computing Association (TCA)

TCA is is a non-profit organization promoting the creation and wide availability of IT and AI technologies that are radically more secure and accountable than today’s state of the art.

Ericom Software

Ericom Software

Ericom is a global leader in securing and connecting the digital workspace, offering solutions that secure browsing, and optimize desktop and application delivery to any device, anywhere.

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

Wiz

Wiz

Wiz - the first cloud visibility solution for enterprise security: A 360° view of security risks across clouds, containers and workloads.

CACI International

CACI International

CACI is at the forefront of developing and delivering technological breakthroughs that transform and optimize government operations.

Netstar

Netstar

Netstar is an IT Support company based in Central London providing fully managed IT Support, Cyber Security and Technology Consulting services.

Fortify 24/7

Fortify 24/7

Fortify 24×7 provides a robust portfolio of managed cybersecurity solutions to help you identify and prevent attacks.

Metabase Q

Metabase Q

Metabase Q protects you from financial and reputational losses with more efficient and intelligent cybersecurity, using the best worldwide in technologies, processes and specialists.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

RapidSpike

RapidSpike

RapidSpike is the only website monitoring solution that focuses all three key aspects of website health: performance, reliability AND security.

CyberSecAsia

CyberSecAsia

CyberSecAsia series conference is the one and only decision-makers gathering for CISO and info security experts in Asia.