FREE TO VIEW


« Back to News

2024-11-12

Empowering Employees To Prevent Data Leaks

Process Over Top-Down Enforcement: Many workers are beginning to feel overwhelmed by complex security rules. By Anita Mavridis & Sue Musumeci

2024-11-12

Strengthen Software Supply Chain & Governance For Better AI System Cybersecurity

Its increasing use for sophisticated phishing emails and deep fake attacks makes AI security more important than ever. By Srikrishna Shankavaram

2024-11-11

The Human Impact Of Ransomware In Healthcare

Urgent action is needed to combat the cybersecurity trade-off which is putting patient’s health and wellbeing at risk. By Darren Williams

2024-11-08

Cyber Security: The Fastest Growing IT Work In The UK

Cyber security is the fastest growing tech occupation in the UK, with the number of people in cyber roles more than doubling between 2021 & 2024. 

2024-11-11

Ai-Da - The Robot Artist

Portrait Of Alan Turing: A painting by an AI robot of the eminent World War Two codebreaker mathematician has been sold for over $1m.

2024-11-11

Hackers Target Sensitive Corporate Data 

40GB Of Data Stolen: The French multinational energy & automation company Schneider Electric has suffered a severe attack.

2024-11-08

Testing APIs Against The OWASP LLM Top 10

Insufficiant Testing: Several popular GenAI applications have been found to be exposed to indirect prompt injection vulnerabilities. By Andy Mills

2024-11-08

NAKIVO Backup & Replication: The Best Solution For Business Data Backup

Explore the features and capabilities of NAKIVO Backup & Replication - the fast and efficient solution for business data backup and recovery. 

2024-11-07

Cybercrime & Trade Secrets

Navigating New IP Threats In A Digital World: As the value of IP continues to grow, protecting trade secrets is a big issue. By Randy Sadler

2024-11-07

The Importance Of Ensuring Domain Infrastructure Security

Domain names play an important role in protecting our digital infrastructure in more ways than one. Q&A Interview with Ram Mohan

2024-11-01

Canada Accuses India Of Using Spyware To Track Separatists

Canada's main spy agency says it has found evidence of the Indian government using illicit spyware to track & intercept Sikh separatists.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

Vaddy

Vaddy

Vaddy provide an automatic web vulnerability scanner for DevOps that performs robust security checks to ensure that web app code is secure.

Maryman & Associates

Maryman & Associates

Maryman & Associates are specialists in computer forensic investigations, incident response and e-discovery services.

ObserveIT

ObserveIT

ObserveIT helps companies identify & eliminate insider threats. Visually monitor & quickly investigate with our easy-deploy user activity monitoring solution.

CERT-AM

CERT-AM

CERT-AM is the national Computer Emergency Response Team for Armenia.

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

Uppsala Security

Uppsala Security

Uppsala Security built the first crowdsourced Threat Intelligence platform known as the Sentinel Protocol, which is powered by blockchain technology.

Capsule8

Capsule8

Capsule8 is the only company providing high-performance attack protection for Linux production environments.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

Evolution Equity Partners

Evolution Equity Partners

Evolution Equity Partners is an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies.

Blumira

Blumira

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively.

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.

6clicks

6clicks

6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards.

eMudhra

eMudhra

eMudhra is a leader in Identity and Transaction Management Solutions.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

ProvenRun

ProvenRun

ProvenRun is a leading provider of trusted software solutions with extensive expertise and an unwavering commitment to security.