FREE TO VIEW


« Back to News

2024-06-27

Europe's Digital Market Act Comes Into Force

Illegal App Store: European Union regulators have accused Apple of being in breach of new laws designed to restrict the big technology companies.

2024-06-28

The Crucial Role Of AI Red Teaming In Safeguarding Systems & Data

Red teaming exercises are one of the best ways to identify security & safety concerns in emerging technologies like generative AI. By Dane Sherrets

2024-06-27

Malware Targeting Smart TVs

Pandoraspear malware, which targets smart TVs running an open-source Android OS, has jumped into the top 10 most widely detected malware list.

2024-06-28

Music Rights Owners Want Payment From AI Platforms

The music industry is joining a growing number of claims by authors & news organisations disputing the right of AI firms to use their work.

2024-06-27

Cyber Aftermath From The Airstrike On Syria’s Iranian Consulate

Strikes & Bytes: What role will cyberspace play as the expanding conflict in the Middle East saga continues to go on? By Craig Watt

2024-06-27

The Rising Threat Of Deepfakes

Exploring The Security Challenges & Opportunities Of AI: Realistic deepfake images, audio, & video, are a growing threat. By Sam Peters

2024-06-26

LockBit Claims It Hacked The US Federal Reserve

LockBit claims to have stolen 33 terabytes of confidential data from the US Federal Reserve, but security researchers are expressing doubt.

2024-06-26

Hacker, Spy, Or Journalist?

The enigmatic founder of Wikileaks, Julian Assange, returns to Australia a free man after pleading guilty to only one US charge of espionage.

2024-06-25

Hackers Use Windows Backdoor To Deliver BadSpace

Fake Browser Update: A multi-stage attack chain involving an infected website, a command-and-control server, and a JScript downloader.

2024-06-25

How To Effectively Detect & Prevent SAP Threats

Porous Entry Points: SAP systems contain IT-enabled or overlooked vulnerabilities which leave them open to exploitation. By Christoph Nagy

2024-06-25

Cyber Security Staff Burnout Costs Firms $600m A Year

Work-related stress, fatigue, illness and burnout are making cybersecurity professionals less productive, costing $millions.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Nimbusec

Nimbusec

Nimbusec scans your website around the clock and informs immediately if it has been hacked or manipulated

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

Copenhagen FinTech

Copenhagen FinTech

Copenhagen FinTech is a centre for R&D and innovation in the Danish finance IT sector. Focus areas include cyber security and payments platforms.

SlashNext

SlashNext

The SlashNext Internet Access Protection System (IAPS) provides Zero-Day protection against all internet access threats including Social Engineering & Phishing, Malware, Exploits and Callback Attacks.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

Sysdig

Sysdig

With Sysdig teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance.

Combis

Combis

COMBIS is a regional high-tech ICT company focused on the development of application, communication, security and system solutions and the provision of services.

McIntyre Associates

McIntyre Associates

McIntyre Associates is an Executive Search boutique specialized in recruiting for the Cybersecurity industry. Our clients range from Venture Capital backed startups to Fortune 100 companies.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

Veratad Technologies

Veratad Technologies

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions.

Cyber Coaching

Cyber Coaching

Cyber Coaching is a community for enhancing technical cyber skills, through unofficial certification training, cyber mentorship, and personalised occupational transition programs.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

Cyber Qubits

Cyber Qubits

Cyber Qubits is a cybersecurity training and consulting company focused on developing the next generation of cybersecurity professionals.

MergeBase

MergeBase

Reduce software supply chain risk with MergeBase proven Software Composition Analysis (SCA).

Surf Security

Surf Security

SURF Security has transformed the browser into your strongest security asset while providing complete end-user privacy – all with full compliance.

Aprio

Aprio

Aprio is a premier business advisory and accounting firm. We deliver advisory, tax, managed, and private client services to build value, drive growth, manage risk, and protect wealth.