FREE TO VIEW


« Back to News

2024-09-17

2024 US Presidential Election: Nation State Cyber Threats

As the country prepares to vote, hostile nation state actors are seeking to capitalize on US instability to meet pre-defined objectives. By Craig Watt 

2024-09-18

Is The NIS2 Directive A Step In The Right Direction? 

New EU-wide legislation on cybersecurity will provide legal measures to boost the overall level of cybersecurity across the EU. By Yannis Velitsikakis

2024-09-13

Unlocking A Unified Digital Identity For Europe

eIDAS 2.0: Empowering EU citizens by ensuring their personal data is protected throughout the digital identity ecosystem. By Tim Callan

2024-09-12

Donald Trump Trolls Taylor Swift

The famous pop star has hit back against a deepfake of her falsely endorsing Donald Trump, highlighting fears of AI-generated disinformation.

2024-09-11

NIS2 - Countdown To Compliance

How CISOs Can Lead The Charge: Immediate actions CISOs must take to ensure their organisations fully comply with NIS2. By Andrew Lintell

2024-09-11

Quantum-Safe Encryption Comes Closer

Quantum Computing Wil Overturn Public-Key Cryptography: NIST has new cryptographic algorithms that can withstand quantum computer power.

2024-09-10

The Obstacles That Security Teams Face In Vulnerability Management

The Big Five: To stay ahead of adversaries, teams must use advanced technologies and prioritise the most critical vulnerabilities. By Sylvain Cortes

2024-09-10

Google's $200 Billion AdTech Business Has A Monopoly Challenge

Google has lost one major case concerning its dominance in Online Search. Now, it faces a second lawsuit challenging its dominace in AdTech.

2024-09-10

Social Media, Misinformation & The US Elections

Generative AI plus a reliance on social media & other online news sources are making it hard for voters to know what's real and what's not.

2024-09-09

Criminally Exploiting AI Tools To Generate Illicit Revenue From Music Streaming

The accused claimed more than $10m in music royalty payments using AI tools and a network of bots, in a highly sophisticated long-term fraud.

2024-09-09

Telegram Disables Features Used For Illegal Activity

Telegram has moved fast to change some key features of its messaging platform, affecting 950m users, following the arrest of CEO Pavel Durov.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Zayo

Zayo

Zayo is a leading global bandwidth infrastructure services provider for high-performance connectivity, secure colocation and flexible cloud services.

Datto

Datto

Datto delivers a single toolbox of easy to use products and services designed specifically for managed service providers and the businesses they serve.

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

HvS Consulting

HvS Consulting

HvS Consulting is a specialist information security company offering a full range of services including IT security architecture, ISO 27001 audits, Pentesting, Security monitoring and Training.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

CyberStream

CyberStream

CyberStream, a division of the TechStream Group, is an information & cybersecurity talent acquisition solution provider.

HolistiCyber

HolistiCyber

HolistiCyber provide state-of-the art consulting, services, and solutions to help proactively and holistically defend against a new era of constantly evolving cyber threats.

Cyber Defense Technologies (CDT)

Cyber Defense Technologies (CDT)

Cyber Defense Technologies provides services and turn-key solutions to secure and maintain the integrity of your organization’s systems and data against attacks.

National Cybersecurity Alliance

National Cybersecurity Alliance

The National Cybersecurity Alliance is a non-profit organization on a mission to create a more secure, interconnected world.

Secora Consulting

Secora Consulting

Secora Consulting is a professional services company specialising in tailored cybersecurity assessments and cyber advisory services.

Varutra Consulting

Varutra Consulting

Varutra Consulting is an Cyber Security Consulting, Solutions and Training services firm, providing specialized security services for software, mobile and network.

inSOC

inSOC

inSOC is an enterprise-grade AI-driven SOCaaS solution detecting breaches 24/7 with vulnerability management built-in. Designed for MSPs and MSSPs.

Technation

Technation

Technation proudly represents the Canadian technology companies that are furthering our nation and the world into the future through innovation, creativity and ingenuity.

Cyber Defense International (CDI)

Cyber Defense International (CDI)

At CDI, we utilize decades of experience in designing and building large-scale cybersecurity programs, creating tailored solutions and services that protect businesses from cyber threats.

Infosec Ventures

Infosec Ventures

Infosec Ventures incubates and scales cyber security innovators that solve inefficiencies in cyber security.

NetBird

NetBird

NetBird combines a WireGuard-based overlay network with Zero Trust Network Access, providing a unified platform for reliable and secure connectivity.