FREE TO VIEW


« Back to News

2024-09-02

The Rise Of SD-WAN And Its Implications For Security & Performance

Navigating The Future Of Networking: The deployment of SD-WAN should go hand in hand with increased cyber surveillance. By John Diamond

2024-09-02

Standards: The Key To Building A Sustainable Quantum-Safe Future 

Quantum computing has the potential to address some urgent problems, while simultaneously risking security infrastructure. By Issam Toufik

2024-09-02

X Blocked In Brazil By Supreme Court Order

Around 20 million X users in Brazil face a $9,000 daily fine for accessing Elon Musk's social media platform in a dispute over alleged censorship.

2024-09-02

Telegram CEO Under Criminal Investigation In France

Update: Suspected offenses include complicity in illegal gang transactions, money-laundering and unauthorised provision of encryption.

2024-08-27

PDF Merging Guide: Simplify Document Management

PDF merging enhances document workflows and organization for business and personal use, with practical steps for combining files efficiently.

2024-08-30

Understanding Social Engineering Attack Methods 

Social Engineering Targets Human Vulnerabilities: Deceiving unsuspecting users into dropping their security & giving up sensitive information.

2024-08-28

For Many Businesses Experiencing MultiCloud Data Breach, Multi-Cloud Security Could Be The Answer

There are common challenges associated with securing multi-cloud environments and multi-cloud security can help prevent these breaches.

2024-08-29

The NIS2 Directive Will Impact The Security Ecosystem Across The EU

NIS2: Protecting networks and information systems through proactive measures and responding quickly when under a cyberattack. By Jos Beernink

2024-08-29

Mobile & On-Line Banking Cyber Security [extract]

Managing Your Money Online: Banks take your security seriously, but it's still important that you take steps to stay safe while banking online.

2024-08-29

Iranian Hackers Target Israeli Citizens

Hackers though to be connected to the government of Iran have stepped up phishing attacks targeting high-profile individuals in Israel.

2024-08-28

Enhancing SaaS Security: Leveraging VPNs & ITDR to Combat Identity Theft:

Organizations can establish a strong barrier against the various dangers aimed at their networks by adopting ITDR and VPNs in their security plan.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

European Internet Forum (EIF)

European Internet Forum (EIF)

EIF’s mission is to help provide European political leadership for the political, economic and social challenges of the worldwide digital transformation.

Synopsys

Synopsys

Synopsys delivers trusted and comprehensive silicon to systems design solutions, from electronic design automation to silicon IP and system verification and validation.

ForgeRock

ForgeRock

ForgeRock, the leader in digital identity, delivers comprehensive Identity and Access Management solutions for consumers, employees and things to simply and safely access the connected world.

ObserveIT

ObserveIT

ObserveIT helps companies identify & eliminate insider threats. Visually monitor & quickly investigate with our easy-deploy user activity monitoring solution.

Insta Group

Insta Group

Insta are a trusted cyber security partner for security-critical companies and organizations.

SBS CyberSecurity

SBS CyberSecurity

SBS CyberSecurity is a premier cybersecurity consulting and audit firm.

Resilia

Resilia

RESILIA is a comprehensive portfolio of tools and training to help your organization achieve global best practice in cyber security.

LEPL Cyber ​​Security Bureau - Georgia

LEPL Cyber ​​Security Bureau - Georgia

The aim of the LEPL Cyber Security Bureau is to create and strengthen stable, efficient and secure systems of information and communications technologies.

Mitre

Mitre

At Mitre we work across government to tackle challenges to the safety, stability, and well-being of our nation. Areas of expertise include Cybersecurity.

United Biometrics

United Biometrics

United Biometrics is an anonymous and real-time authentication platform designed to stop the fraud for mobile payments, e-Commerce and applications.

Calyptix Security

Calyptix Security

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology.

HacWare

HacWare

HacWare is a data driven cybersecurity awareness product that leverages machine learning and behavior analytics help IT professionals combat phishing.

Sovrin Foundation

Sovrin Foundation

The Sovrin Foundation is a private-sector, international non-profit that was established to govern the world's first self-sovereign identity (SSI) network.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

Methods

Methods

Methods is the leading digital transformation partner for the UK public sector. We care deeply about making our public services better and have been doing this for over 28 years.

SOC-E

SOC-E

SOC-E is a leading technology provider for high-availability and deterministic networking, sub-microsecond synchronization and cybersecurity solutions for critical sectors.