FREE TO VIEW


« Back to News

2024-01-04

EU Updates Its Cyber Solidarity Act

A Cyber Shield For Member States: Increased cooperation between member states will improve their security management in response to attacks.

2024-01-04

The Pivotal Role Of Access Control In Cyber Security

As essential as locks and keys are in the physical world, establishing effective control over who can enter your digital space is vital.

2024-01-05

AI, Security Culture & Rising Threats

Cybersecurity Predictions For 2024: With criminals rapidly adopting Artificial Intelligence tools, CISOs must raise their game. By Tom Gorup.

2024-01-03

Bridging The Cybersecurity Skills Gap With Efficiency

How Cloud SIEM Platforms Can Maximize SOC Scalability: Innovative cloud-based solutions can help navigate the skills shortage. By Kev Eley

2023-12-28

Albanian Parliament & Telecoms Operator Attacked

Iranian Hackers Claim Responsibility: Albania’s Parliament and a national telecommunications company targeted by cyber attacks.

2024-01-02

The New York Times Intends To Sue Microsoft  & OpenAI

Critical Test Case: The US newspaper is suing OpenAI & Microsoft for copyright infringement, claiming their AI models were built without permission.

2025-04-02

Cyber Security Jobs In 2025

If you’re looking for a rewarding career, cyber security might be your ideal choice. Qualified professionals are in high demand and the pay is good. 

2023-12-29

Guidelines For The ‘Catastrophic Risks’ Of AI

Preparedness Framework: OpenAI has taken the initiative and published its own guidelines for assessing the risks of Artificial Intelligence models.

2023-12-28

European Union Charges Twitter X With Breaking The Law

Illegal Content & Disinformation: The EU is taking regulatory action against Twitter X under its recently implemented Digital Services Act.

2023-12-28

Hackers Attack Iranian Fuel Infrastructure

Predatory Sparrow: An Israeli hacking group has claimed responsibility for a widespread attack disrupting petrol distribution across Iran.

2023-12-27

The Next Generation Of Cloud Security

Cloud-Native Application Protection Platform: A package of security tools that helps safeguard your data & applications in the cloud.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

Feitian Technologies

Feitian Technologies

Feitian Technologies provides authentication and transaction security products for financial institutions, telecoms, government and leading business enterprises.

PubNub

PubNub

PubNub enables developers to build secure realtime Mobile, Web, and IoT Apps.

Tiro Security

Tiro Security

Tiro Security is a boutique company specializing in information security and IT audit recruitment and solutions.

QA

QA

QA is a leading IT training provider in the UK with over 1,500 courses covering all areas of IT including Cyber Security.

InFyra

InFyra

InFyra is an IoT & Telecoms specialist consultancy, with extensive global and local experience in business and technology strategy, networks and solutions development.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

CounterFind

CounterFind

CounterFind is turnkey technology that allows brands to find and remove counterfeit and infringing merchandise from online marketplaces and social media sites.

Systems Assessment Bureau (SAB)

Systems Assessment Bureau (SAB)

Systems Assessment Bureau is an internationally recognized ISO Certification Body with a unique vision of “Excel together with global standards”.

Talion

Talion

Talion aim to reduce the complexity involved in securing your organisation and to give security teams unrivalled visibility into their security operations, so they can make optimal decisions, fast.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

GlassHouse Technology

GlassHouse Technology

GlassHouse supports customers in their digitalization journey with our deep technical expertise in Managed Cloud and Security Services, SAP Infrastructure Service and Business Continuity Services.

CyberSG TIG Centre

CyberSG TIG Centre

CyberSG TIG Centre aims to propel Singapore as the world’s premier cybersecurity innovation hub for economic growth.

Black Belt Secure

Black Belt Secure

We provide critical cybersecurity services such as managed security, ransomware mitigation, penetration testing, system auditing and compliance services to your organization.

ArmorX AI

ArmorX AI

ArmorX AI (formerly Kapalya) operates an encryption management platform designed to encrypt all data in transit and at rest on mobile end-points, corporate servers, and cloud servers.

Secomea

Secomea

Secomea redefines manufacturing plant security by combining internationally recognized industry best practices as critical components of our robust cybersecurity strategy.