FREE TO VIEW


« Back to News

2023-07-14

WEBINAR | Uplevel Your Cloud Security Posture With CSPM

WEBINAR | JULY 27: Navigating cloud security: The importance of Cloud Security Posture Management tools.

2023-07-26

Setting Up An Operational Resilience Framework

In the face of a destructive cyberattack enterprises must plan to mitigate the impact based on pre-established objectives. By Bill Nelson

2023-07-14

Hollywood Stars Strike Over AI Human Replacements

Virtual Body Double: Writers and actors are concerned about generative Artificial Intelligence tools replacing their roles in film & TV.

2023-07-15

Britain's Biggest Hospital Held To Ransom

ALPHV, or BlackCat, has infiltrated one of the UK’s largest NHS hospital groups, threatening to expose a vast cache of confidential staff data.

2023-07-25

Managing The Effects Of AI-Driven Cyber Attacks

Criminals are scaling how they compromise systems & execute attacks. Organisations need agile, comprehensive, unified security solutions.

2023-08-09

WatchGuard Expands Identity Protection Capabilities

The new solution adds advanced password management capabilities and Dark Web monitoring to help protect corporate credentials.

2023-08-03

Chinese Spies Used Forged Validation Tokens To Access Government Emails

Chinese hackers breached email accounts at numerous organisations, including US government agencies, to intercept secret information.

2023-07-19

RomCom Hackers Target NATO Summit

RomCom Rat: Russian state-sponsored hackers detected using malicious downloads targeting delegates attending a NATO conference.

2023-07-19

Details On How Revolut's Payment System Got Hacked

Hackers exploited differences between European and US payment systems, finding an unknown flaw enabling them to steal over $20m.

2023-08-03

The Most Used Malware In H1 2023

Qbot has been the most prevalent malware so far in 2023, ranking first in five out of the six months to date, while MOVEit has made a big impact.

2023-07-28

HSBC Using Quantum To Protect Against Cyber Threats

The major international bank is testing a quantum-secured network in London's financial centre, as it prepares for future security threats.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

Ritz

Ritz

Ritz is the largest holistic pure-play cyber security solutions provider in Myanmar.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

Objectives of the ISA Global Cybersecurity Alliance include the acceleration and expansion of standards, certification, education programs, advocacy efforts, and thought leadership.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM)

Business Resilience International Management (BRIM) is engaged by law enforcement in the UK and overseas to advise on establishing and developing Cyber Resilience Centres (CRCs) for business.

Cythereal

Cythereal

Cythereal is the leader in predicting and preventing advanced malware attacks. Security Automation for the Overwhelmed Administrator.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

blueAllianceIT

blueAllianceIT

blueAlliance IT is an investment and growth platform that unites local MSP and IT companies around the nation, helping them to grow and operate competitively.

SoftwareONE

SoftwareONE

SoftwareONE is a leading global provider of end-to-end software and cloud technology solutions.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.

AppSentinels

AppSentinels

Appsentinels are a group of security and technology experts with a mission to fix gaps in application security.

Forensic IT

Forensic IT

Forensic IT is a specialised cyber security firm with expertise in Digital Forensics and Incident Response (DFIR).

Convergint

Convergint

Convergint is a service-based systems integrator working alongside a global network of partners and manufacturers to deliver a range of solutions including cybersecurity.