FREE TO VIEW


« Back to News

2024-04-05

Why Is Security Reporting Still Failing?

Lost In Translation: Pressure to communicate cyber risk to the board has increased, yet it’s an area that many struggle with. By Phil Robinson

2024-04-12

Helping CISOs Embrace Artificial Intelligence

Centre Of Excellence: Delivering AI-focused cybersecurity consulting services & products to help clients harness the power of AI in the organisation.

2024-04-06

Beware Scammers Imitating Bank Websites

Consumer advice service Which? has found thousands of lookalike websites that imitate British banks, set up to defraud unwary customers.

2024-04-03

The Changing Role Of The CISO 

Strategic Shift: CISOs are increasingly business aware, indicating a significant evolution from traditional roles to strategic business enablers.

2024-03-28

Universities Are Stepping Up Training For More Front-Line Workers

Cyber-Defenders Are In Demand: Pace University is stepping up to train students to identify, defend & mitigate cyber-attacks. By Dr. Jonathan Hill

2024-04-02

Half Of British SMEs Have Lost Vital Data

Almost half (48%) of small and medium-sized businesses in the UK have lost or lost access to company or customer data in the last five years.

2024-04-01

Two Sides Of AI In The Industrial Internet of Things

Dual Perspectives: The synergy of AI and IoT will unlock a new level of creativity & efficiency, redefining industrial operations. By Antoinette Hodes

2024-04-02

What Will The NIS2 Directive Mean For Smaller Organisations?

Raising The Security Bar: NIS2 expands the scope of entities covered and EU states must adopt the legislation by October. By Bernard Montel

2024-04-02

Data Compliance When Using MS Copilot

Implementing Microsoft Copilot: You’ve heard the hype, everyone wants it, but how do you implement it without causing harm? By Mike Bellido

2024-04-02

The Dynamic Influence Of AI On Business Cybersecurity

Cybersecurity professionals have a responsibility to maintain control over AI & establish clear guidelines over its use. By Jason Kemmerer

2024-04-02

Prioritising Prevention Is Better Than Paying Ransom

Wake Up: By working together and staying vigilant, we can protect ourselves from the damaging effects of ransomware. By Brandon Rochat

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

rPeople Staffing

rPeople Staffing

rPeople provides direct placement in all areas of your organization, including and specializing in Technical and Executive hiring.

Morgan Lewis Law

Morgan Lewis Law

Morgan Lewis is an international law firm with offices in North America, Europe, Asia, and the Middle East. Practice areas include Privacy and Cybersecurity.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

ABL Cyber Academy

ABL Cyber Academy

ABL provide certified training courses in the field of cyber security and IT project management.

Trulioo

Trulioo

Trulioo is a leading global identity and business verification company providing secure access to data sources worldwide to instantly verify consumers and businesses online.

Digital Arts

Digital Arts

Digital Arts provides internet security software and appliance products for companies and individuals.

NETAS

NETAS

Netas offers solutions in information and communication technologies including end-to-end value added solutions, system integration and technology services to providers and corporations.

Perseus Cyber Security

Perseus Cyber Security

Perseus provides all-around digital protection for small and medium-sized businesses through state-of-the-art software solutions, flexible online training and emergency response.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

MailChannels

MailChannels

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world.

Cisilion

Cisilion

Cisilion's mission is simple – to transform and connect business with next-generation IT infrastructure. Our expertise includes enterprise networking, security, data centre & cloud, managed services.

eGyanamTech (EGT)

eGyanamTech (EGT)

eGyanamTech provides robust security solutions tailored for Operational Technology (OT) and Supervisory Control and Data Acquisition (SCADA) systems used in critical infrastructure systems.

ITButler e-Services

ITButler e-Services

At IT Butler, our mission is crystal clear: we are dedicated to providing top-tier cybersecurity solutions and best-practice methodologies to secure and enhance your digital infrastructure’s resilienc

Ncontracts

Ncontracts

Our mission at Ncontracts is to continually improve our clients’ ability to manage risk and compliance.

GrayHats

GrayHats

GrayHats is a platform-based cybersecurity company devoted to delivering comprehensive, scalable, and proactive protection for businesses in an ever-evolving threat landscape.

Equixly

Equixly

Equixly is revolutionizing application security by empowering developers and organizations to build more secure software, elevate their security posture, and stay ahead of emerging threats.