FREE TO VIEW


« Back to News

2024-04-09

The Importance Of Formal Verification Networks For Secure Software

The challenge of eliminating widespread software vulnerabilities is an urgent problem. New approaches are needed to mitigate risk. By Fabien Chouteau

2024-04-09

Increase security for your enterprise cloud with a next-generation firewall

New On-Demand Webinar: Modern enterprise application stacks need protection at various levels and with multiple capabilities. Watch Now

2024-04-08

Understanding The Threats & Opportunities Posed By AI

Arrested Development: Cybersecurity teams must quickly embrace the benefits that AI offers them to keep pace with cybercriminals. By Brian Martin

2024-04-05

The US & Britain Reach Agreement On AI Regulation 

Common Approach: A landmark bilateral deal on AI as governments around the world seek to control and regulate emerging AI technology.

2024-04-04

Famous Musicians Want To Stop AI - Generated Music

Assault On Creativity: Hundreds of artists have joined a campaign to condemn the 'predatory' use of Artificial Intelligence in the music business.

2024-04-04

Top 10 Emerging Cyber Security Threats By 2030

ENISA On Future Preparedness: As we move into the third decade of the 21st century, we must prepare for new & escalating cyber security threats.

2024-04-04

Exposed - Seventy Million AT&T Customers Personal Data

Addresses, Social Security Numbers & Passcodes: Around 73 million AT&T customers personal data has been leaked online.

2024-04-11

A New Era Of Accelerated Computing

Superchips: Powering a new era of computing, NVIDIA has announced the Blackwell GPU, which has several transformative features.

2024-04-09

Spanish Healthcare Service Works On Resilience

Healthcare Is A Prime Target: In response to growing cyber threats to medical organisations, Spain’s health sector is taking decisive action.

2024-04-04

Cambridge University Medical IT System Hacked

Biomedical researchers at Cambridge University have been unable to access computer systems due to suspected "malicious activity".

2024-04-04

Nuclear Waste Dump Faces Prosecution For Cyber Security Offences

IT Security: The British Nuclear Safety regulator will be prosecuting the managing company of the Sellafield nuclear reprocessing plant.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NuHarbor Security

NuHarbor Security

NuHarbor is a leading information security consulting and advisory firm specializing in Information Security, Compliance, and Risk Management.

SecurityMetrics

SecurityMetrics

SecurityMetrics is leader in data security, PCI, and HIPAA compliance solutions

Forcepoint

Forcepoint

Forcepoint provide a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies of managing multiple point security products.

Cyber Command

Cyber Command

Our Managed IT service allows clients to offload the management of day-to-day computer, server, and networking support to our team of professionals.

MKD-CIRT

MKD-CIRT

MKD-CIRT is the national Computer Incident Response Team for Macedonia.

CybergymIEC

CybergymIEC

CybergymIEC is a global leader in cyber defense solutions and training services.

DeuZert

DeuZert

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management).

Cowbell Cyber

Cowbell Cyber

Cowbell Cyber™ offers continuous risk assessment, comprehensive cyber liability coverage, and continuous underwriting through an AI-powered platform.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

Scybers

Scybers

Scybers are a global cybersecurity advisory and managed services company. With our deep expertise, we help our clients reduce their cyber risks with confidence.

Cybernatics

Cybernatics

Cybernatics is inspired by bringing together best-in-class innovations around Cybersecurity and Analytics. We offer tailored enterprise solutions to safeguard your organisations best interests.

Mondoo

Mondoo

Mondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure.

Zyber 365 Group

Zyber 365 Group

Zyber 365 are providing a robust, decentralized, and cyber-secured operating system which adheres to the fundamental principles of environmental sustainability.

Indevtech

Indevtech

Indevtech has been serving Hawaii since 2001, providing end-to-end managed IT services to small- and medium-businesses.

Karthik Consulting (KC)

Karthik Consulting (KC)

Karthik Consulting is a technology service provider specializing in IT services for the U.S. federal government.

Potech

Potech

Potech provides masterful services in Information & Technology and Cybersecurity to multiple markets across the world.