FREE TO VIEW


« Back to News

2024-12-05

US Telecoms Customer Data Stolen By Chinese Hackers 

Salt Typhoon: Dozens of companies have been penetrated, including at least eight major US telecoms & broadband infrastructure firms.

2024-12-06

Microsoft Faces £1bn Lawsuit For Cloud Licencing Damages

Restricting Competition: Many UK businesses could be in line to receive substantial compensation if the claim filed against Microsoft succeeds.

2024-12-05

Are Your Deduplication Capabilities Good Enough?

Effective mitigation requires quick evaluation of alerts. Teams must tackle the twin issues of false positives & duplicate alerts. By Greg Anderson

2024-12-05

NIST'S Post-Quantum Standards Are Just The Beginning

Evolving quantum threats call for a broader, more comprehensive approach to strengthening network security. Q&A with Andy Leaver

2024-12-04

Empowering Women To Take On More Roles In Cybersecurity

Bridging The Gap in Cybersecurity Roles: Diversity is crucial in cybersecurity & improves the overall defense of organizations. By Nazy Fouladirad

2024-12-03

What Is A Threat Exposure Management Platform & Does Your Company Need One?

With a rise in cyberattacks, businesses must consider new ways to protect themselves. Is a Threat Exposure management platform right for you?

2024-12-03

Britain's Cyber Risk Is “Widely Underestimated” 

The UK must wake up to the severity of the cyber threat, according to the National Cyber Security Centre, as its new Director speaks on the record.

2024-12-03

Artificial Intelligence Steps Into The Boardroom

Business leaders won’t be happy to use AI in the boardroom before they understand how the apparent risks are being mitigated. By Nail & Whittaker

2024-12-03

US Citizen Jailed For Cyber Espionage

A US citizen has been sentenced to jail for spying and sharing sensitive information about his employers with China's domestic intelligence agency.

2024-12-03

Iranian Hackers Are Exploiting LinkedIn

SnailResin: A fake recruitment campaign targeting LinkedIn users working in the aerospace industry used to deliver elusive malicious malware.

2024-12-03

Four Evolving Trends Every Business Leader Should Be Aware Of

Cybersecurity In 2025: Companies really need to embrace best practices & build strong foundational security policies to stay ahead. By Luke Dash

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Talend

Talend

Talend is a leader in cloud and big data integration software. Applications include Risk and Compliance management.

RoboForm

RoboForm

RoboForm's industry-leading encryption technology securely stores your passwords, with one Master Password serving as your encryption key.

Organization for Security and Co-operation in Europe (OSCE)

Organization for Security and Co-operation in Europe (OSCE)

OSCE is the world's largest security-oriented intergovernmental organization. Areas of activity include Cyber/ICT security.

MetricStream

MetricStream

MetricStream provide integrated GRC solutions across business, IT, and security functions.

Total Defense

Total Defense

Total Defense solutions include anti-malware, anti-virus, intrusion prevention & mobile security.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

National Cyber Security Authority (NCA) - Saudi Arabia

National Cyber Security Authority (NCA) - Saudi Arabia

The NCA is the government entity in charge of cybersecurity in Saudi Arabia and serves as the national authority on its affairs.

CryptoSec.info

CryptoSec.info

CryptoSec.info is a web resource focused on educating the beginners in the cryptocurrency space on how to properly secure their online assets from hackers and scammers.

Startup Wise Guys

Startup Wise Guys

Startup Wise Guys is a mentorship-driven accelerator program for early stage B2B SaaS, Fintech, Cybersecurity & Defense AI startups.

iSecurity Consulting

iSecurity Consulting

iSecurity delivers a complete lifecycle of digital protection services across the globe for public and private sector clients.

VariQ

VariQ

VariQ is a premier provider of Cybersecurity, Software Development and Cloud services to federal, state, and local government.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

Institute for Applied Network Security (IANS)

Institute for Applied Network Security (IANS)

For the security practitioner caught between rapidly evolving threats and demanding executives, IANS Research is a clear-headed resource for decision making and articulating risk.

CyTwist

CyTwist

CyTwist is an early warning attack detection platform that complement your existing security suite and provides your security teams with unique detection capabilities of stealth targeted attacks.

NetSfere

NetSfere

NetSfere provides next-generation messaging and mobility solutions to carriers and enterprises globally including its enterprise-grade, secure mobile messaging platform NetSfere Enterprise.

Monokee

Monokee

Monokee offers a solution that seamlessly integrates powerful Identity and Access Management (IAM) capabilities with a low/no code identity orchestrator.