FREE TO VIEW


« Back to News

2024-11-13

Network Pen Testing Is A Cybersecurity Secret Weapon

Here’s How To Use It: Six reasons why pen testing should be a regular part of an organization’s security strategy. By Alton Johnson

2024-11-12

Fancy Bear At Work

Confirm You Are Not A Robot: A phishing campaign using emails that deliver a link which appears to be a Google reCAPTCHA bot-detection dialog.

2024-11-12

Empowering Employees To Prevent Data Leaks

Process Over Top-Down Enforcement: Many workers are beginning to feel overwhelmed by complex security rules. By Anita Mavridis & Sue Musumeci

2024-11-12

Strengthen Software Supply Chain & Governance For Better AI System Cybersecurity

Its increasing use for sophisticated phishing emails and deep fake attacks makes AI security more important than ever. By Srikrishna Shankavaram

2024-11-11

The Human Impact Of Ransomware In Healthcare

Urgent action is needed to combat the cybersecurity trade-off which is putting patient’s health and wellbeing at risk. By Darren Williams

2024-11-08

Cyber Security: The Fastest Growing IT Work In The UK

Cyber security is the fastest growing tech occupation in the UK, with the number of people in cyber roles more than doubling between 2021 & 2024. 

2024-11-11

Ai-Da - The Robot Artist

Portrait Of Alan Turing: A painting by an AI robot of the eminent World War Two codebreaker mathematician has been sold for over $1m.

2024-11-11

Hackers Target Sensitive Corporate Data 

40GB Of Data Stolen: The French multinational energy & automation company Schneider Electric has suffered a severe attack.

2024-11-08

Testing APIs Against The OWASP LLM Top 10

Insufficiant Testing: Several popular GenAI applications have been found to be exposed to indirect prompt injection vulnerabilities. By Andy Mills

2024-11-08

NAKIVO Backup & Replication: The Best Solution For Business Data Backup

Explore the features and capabilities of NAKIVO Backup & Replication - the fast and efficient solution for business data backup and recovery. 

2024-11-07

Cybercrime & Trade Secrets

Navigating New IP Threats In A Digital World: As the value of IP continues to grow, protecting trade secrets is a big issue. By Randy Sadler

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

National Security Agency (NSA) - USA

National Security Agency (NSA) - USA

NSA is a US intel agency responsible for the protection of government communications and information systems against penetration and network warfare.

CommuniTake

CommuniTake

CommuniTake builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use.

LUCY Security

LUCY Security

LUCY is the answer when you want to increase your IT security, maintain your cyber security awareness, or test your IT defenses.

Scanmeter

Scanmeter

Scanmeter helps identifying vulnerabilities in software and systems before they can be exploited by an attacker.

Ksmartech

Ksmartech

Ksmartech provide services related to security and authentication in all areas where the connection of people to objects, and objects and objects is necessary.

Infopercept Consulting

Infopercept Consulting

Infopercept is a leading cybersecurity company in India, providing a critical layer of security to protect business information, infrastructure & assets across the organization.

Cider Security

Cider Security

Cider Security - It’s time to revolutionize the way Security, Dev and DevOps teams work together to supercharge security at the speed of engineering.

ORS Consulting

ORS Consulting

ORS Consulting is a specialist provider of risk management advisory services supporting asset-intensive industries such as chemicals, energy, power and utilities, defence and maritime.

CertNexus

CertNexus

CertNexus is a vendor-neutral certification body, providing emerging technology certifications and micro-credentials for business, data, developer, IT, and security professionals.

Ping Identity

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom.

Segra

Segra

Segra owns and operates one of the nation’s largest fiber networks and provides best-in-class broadband and data security solutions throughout the Southeast and Mid-Atlantic.

TetherView

TetherView

TetherView provides leading virtual desktop and email security technology to help businesses stand up and manage digital workspaces.

Securin

Securin

Securin offers a comprehensive portfolio of solutions including Attack Surface Management, Vulnerability Intelligence, Penetration Testing, and Vulnerability Management.

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.

ThreatMate

ThreatMate

ThreatMate empowers businesses with comprehensive tools to detect, protect, and remediate against cyber threats.