FREE TO VIEW


« Back to News

2024-02-21

Managed Security Services In The Age of Advanced Threat Intelligence 

The goal of threat intelligence is to ensure organisations have the right tools to make better, faster & decisions based on timely, actionable data.

2024-02-20

Top Three Types of Data Security Technology

Encryption, Firewalls, Authentication & Access Control: The top three types of technology that strengthen security and protect against cyber threats.

2024-02-21

Lockbit's Website Taken Down By Law Enforcement

Update: Lockbit provided ransomware-as-a-service to a global network of hackers, supplying the tools needed to carry out attacks.

2024-02-20

23andMe Sparks A Rethink About Safeguarding Critical Data

On-Premises Vs Hybrid Cloud Strategies: A key question for many organisations today is that of where and how they host their data. By Mark Grindey

2024-02-19

Businesses Must Prioritise Safeguards Against Common Threats

Failure to implement a comprehensive cyber resilience program leaves businesses exposed to cybercrime & financial loss. By John McLoughlin

2024-02-20

Cyber Warfare & The Future Of AI

AI will be integral in the next phase of cyber warfare, enabling new tools and new versions of classic attacks, according to intelligence experts.

2024-02-19

Ten Ways To Elevate Public Sector Cyber Security

Time to Act: The growing volume & sophistication of cyber incidents suggests the public sector faces tremendous challenges.By Deryck Mitchelson

2024-02-19

US Cyber Command Begins A Strategic Review

Cybercom 2.0: With larger teams and stronger capabilities, US adversaries can expect to come under greater pressure than ever before.

2024-02-16

Building A Cyber-Savvy Nation In The Face Of A Talent Shortage

Building a culture of security means investing in your workforce. That's not a one-time expense, but an ongoing commitment. By Spencer Starkey

2024-02-16

Cybersecurity In Managed Cloud: Best Practices For Keeping Your Data Safe

Robust cybersecurity involves choosing a secure provider, implementing strong access controls, and regularly monitoring & updating systems.

2024-02-23

Ransomware Attacks Hit Hospitals In Romania

Childrens and Emergency hospitals in Romania were frozen by a ransomware attack & many others forced offline as a precautionary measure.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Shavlik Protect

Shavlik Protect

Shavlik Protect is an easy-to-use security software solution that discovers missing patches and deploys them to the entire organization.

Zymr

Zymr

Zymr specialize in cloud computing solutions including Cloud Security, Cloud Mobility, Cloud Apps, Cloud Infrastructure and Cloud Orchestration.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

CommuniTake

CommuniTake

CommuniTake builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

Cylus

Cylus

Cylus, a global leader in rail cybersecurity, helps rail and metro companies avoid safety incidents and service disruptions caused by cyber-attacks.

ECHO Project

ECHO Project

The main objective of ECHO is to strengthen the cyber defence of the European Union, enhancing Europe’s technological sovereignty through effective and efficient multi-sector collaboration.

LoughTec

LoughTec

LoughTec secure, manage and connect IT infrastructure for businesses and organisations throughout the UK and Republic of Ireland.

Wabbi

Wabbi

Wabbi’s continuous security platform centralizes, automates and orchestrates security governance and vulnerability management to empower development teams to own appsec.

Bluewave

Bluewave

Bluewave are a strategic IT advisory company that offers businesses a simple and comprehensive way to purchase information technology solutions.

Snare

Snare

Snare is a comprehensive set of event monitoring and analysis tools designed to address critical auditing and security requirements.

ARC Risk and Compliance

ARC Risk and Compliance

ARC Risk and Compliance is a consulting company comprised of a team of AML Specialists completely focused on anti-money laundering compliance and the technologies used to support compliance programs.

HEAL Security

HEAL Security

HEAL Security is the global authority for cybersecurity data, research and insights across the healthcare sector.

MiDO Technologies

MiDO Technologies

MiDO Technologies has a mission to change the narrative around digital enabling tools on the continent of Africa and prepare African youth.

Styx Intelligence

Styx Intelligence

Styx Intelligence’s platform provides visibility and supports remediation against threats targeting your digital assets.