FREE TO VIEW


« Back to News

2023-03-17

TikTok Is Banned From British Government Phones

The app is under increasing scrutiny over its security & data privacy, with concerns it could be used to promote fake news and steal customer data.

2023-03-22

Staying Secure In A Changing World

The Benefits of Regular Cybersecurity Updates: Protecting your data & systems from malicious attacks and staying compliant with latest regulations.

2023-03-16

Deepfakes Are Making Business Email Compromise Worse

Bad actors have upped their game with a new weapon in the arsenal: AI-generated deepfake phishing. How can it be stopped? By Tim Callan

2023-03-16

Why Cutting Cybersecurity Jobs Is Shortsighted

Business leaders should make smarter investments to strengthen existing security, not short-term attempts to save money. By Dan Davies

2023-03-16

British Cyber Security - New Threats Call For Action

Three cybersecurity experts talk about what the UK government needs to include in its updated advice & regulation to ensure better national security.

2023-03-15

DoppelPaymer Hackers Caught

German Police, Europol & the FBI have caught members of a hacking gang associated with the notorious Evil Corp. criminal group.

2023-03-23

A 'Golden Pipeline' To Secure The Supply Chain

Building security into the development process is a priority for organisations aiming to avoid the risks of supply chain compromise. By Nurit Bielorai

2023-03-14

Cybersecurity Is No Longer The Sole Responsibility Of IT Specialists 

Wider recognition that cybersecurity is not the sole responsibility of one team, will hopefully see the burden on CISOs reduced. By Emily Quick

2023-03-10

Ransomware Gang Claims Responsibility For The Attack On Oakland

The Play ransomware gang has taken responsibility for a cyber attack on the City of Oakland that has disrupted IT systems since February.

2023-03-14

Meta Plans A Rival To Twitter 

A decentralized text-based app would allow Meta to take advantage of the current problems with Elon Musk's management of Twitter.

2023-03-13

Conflict Drives A Significant Increase In DDoS Attacks

Recent data analysis reveals increased DDoS attacks, combined with a significant link between geopolitical conflicts and these types of attacks.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Mobile Mentor

Mobile Mentor

Mobile Mentor is an independent provider of enterprise mobility solutions in New Zealand and Australia.

NRI Secure Technologies

NRI Secure Technologies

NRI SecureTechnologies is a Cybersecurity group company of the Nomura Research Institute (NRI) and a global provider of next-generation Managed Security Services and Security Consulting.

FinlayJames

FinlayJames

FinlayJames supports cyber security companies to meet the increasing demand and pressure on them by finding top talent within the industry for their sales, marketing and technical teams.

National Cyber Security Centre (NCSC) - New Zealand

National Cyber Security Centre (NCSC) - New Zealand

The role of the NCSC is to help New Zealand’s most significant public and private sector organisations to protect their information systems from advanced cyber-borne threats.

Agesic

Agesic

Agesic is an institution that leads the development of the Digital Government and the Information and Knowledge Society in Uruguay.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Arm

Arm

Arm delivers a complete IoT solution, from providing the IP for the chip to delivering the cloud services to securely manage the deployment of products throughout their lifecycle.

Nextcloud

Nextcloud

Nextcloud offers offers solutions to the combined need of security and ubiquitous access to data and collaboration technology.

Bessemer Venture Partners (BVP)

Bessemer Venture Partners (BVP)

Bessemer Venture Partners was born from innovations that literally forged modern building and manufacturing. Today, our team of investors works with people who want to create revolutions of their own.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

Surefire Cyber

Surefire Cyber

Surefire Cyber delivers swift, strong response to cyber incidents such as ransomware, email compromise, malware, data theft, and other threats with end-to-end response capabilities.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

StepSecurity

StepSecurity

StepSecurity provides a comprehensive security platform for GitHub Actions.

Complete Cyber

Complete Cyber

Complete Cyber provide professional cybersecurity services and products to help secure your infrastructure, systems and data.