FREE TO VIEW


« Back to News

2023-05-30

Europe - The DDoS Battlefield Of 2022

DDoS attacks are a reflection of major geo-political challenges and have become an increasingly significant part in hybrid cyber warfare. 

2023-05-29

Spy Agencies Warn Of New Threats From Chinese Hackers

Volt Typhoon: The Five Eyes group of western intelligence agencies has issued a notice detailing the nature of the threat from Chinese hackers.

2023-05-26

Enabling Quantum-Safe Cryptography

End-To-End Solution: IBM has released a roadmap outlining the steps organisations can take to transition to quantum-safe cryptography.

2023-05-26

Vulnerable Networks & Advanced Persistent Threats

A poor level of visibility into networks exposes organisations to cyber risks and consequent large-scale disruptions, inflicting substantial losses.

2023-05-25

The Security Risks Of ChatGPT

How Businesses Can Safeguard Their Data: With ChatGPT, criminals can quickly develop malware that wreaks havoc on companies. By Richard Massey

2023-05-24

AI Generated Images Shake The Stock Market

Fake images of an explosion which were most likely created using AI tools caused a brief slump in the NYSE and other financial markets.

2023-06-05

Cybersecurity & The Military

How to Find and Keep the Right People: The US military delivers excellent professional training and faces a struggle to retain its cyber talent.

2023-05-23

Artificial Intelligence To Replace 55,000 Telecom Jobs

A 42% Headcount Reduction: British Telecom plans a much smaller workforce and a significantly reduced cost base by deploying AI.

2023-05-23

Julius Caesar Used Encryption. Shouldn’t You?

For data security needs and for achieving regulatory compliance, encryption should be the baseline for any data security strategy. By Colin Tankard

2023-05-22

Meta Will Contest EU $1.3B Data Privacy Fine

The owner of Facebook has been fined a record $1.3 billion for transferring EU user data to the US, in breach of a previous EU court ruling.

2023-05-22

AI Will Be Disruptive - For Both Security & Jobs

Chatbots & Language Processing: Large numbers of people risk becoming jobless with the changes that ChatGPT-style, generative AI will bring.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Galaxkey

Galaxkey

Galaxkey is a data protection product that protects email, documents and any data using access control and an encryption platform.

DoD Cyber Crime Center (DC3)

DoD Cyber Crime Center (DC3)

DC3 is a US Department of Defense (DoD) center of excellence for Digital and Multimedia forensics.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

IDnext

IDnext

IDnext is the open and independent platform to support innovative approaches in the world of the Digital identity.

Cybonet

Cybonet

Cybonet provides easy to deploy, flexible and scalable security solutions that empower organizations of all sizes to actively safeguard their networks in the face of today’s evolving threats.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

Cloudrise

Cloudrise

Cloudrise are elevating cloud security, data protection, and privacy through assessment, technology enablement, and process automation.

Rocheston

Rocheston

Rocheston is an innovation company with cutting-edge research and development in emerging technologies such as Cybersecurity, Internet of Things, Big Data and automation.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

Labaton Sucharow

Labaton Sucharow

Standing on the horizon of law and technology, our Cybersecurity and Data Privacy Practice helps to protect consumers who have been harmed by businesses’ failures to safeguard their customers' data.

FTx Identity

FTx Identity

FTx Identity is the world's most advanced age verification technology (AVT) and identity management system.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.

EkoCyber

EkoCyber

EkoCyber partner with businesses as a value-added MSSP to provide top-tier, trusted and transparent cyber security services at an affordable price point.

Washington Technology Solutions (WaTech)

Washington Technology Solutions (WaTech)

WaTech operates the state’s core technology infrastructure – the central network and data center, provides strategic direction for cybersecurity and protects state networks from growing cyber threats.