News

2023-10-26

How Businesses Can Avoid Firewall Vulnerabilities

Managed Firewall Services: Without help, thinly spread cybersecurity teams risk failing to protect valuable company data. By Erik Nordquist

2023-10-25

A Microchip To Reshape Artificial Intelligence

NorthPole: IBM has a new microchip design with the potential to power the next generation of AI, enabling smarter, network-independent devices.

2023-10-25

How Cybercriminals Could Be Infiltrating Your Supply Chain

Island Hopping: Infiltrating a single, weaker target to exploit existing credentials and gain access into larger enterprises. By Stuart Hodkinson

2023-10-25

Intelligence Chiefs Accuse China Of IP Theft & Online Deception

Cognitive Warfare: China understands the power of social media to shape perceptions of events. Also, how to carry out online espionage.

2023-10-24

The Latest Trends In Email Threats

Callback Phishing & Malware Delivered Via Google Drive: Email threats remain one of the major sources of trouble for cybersecurity teams.

2023-10-25

The Information War In Gaza & Israel

Disinformation & Hate Speech: In the absence of reliable news on events in Gaza, social media has been playing a big part in filling the gaps.

2023-10-24

Navigating The Data Privacy Maze

How do you comply with ever changing data protection regulations & are they a major impediment to cross-border business? By Katie Simmonds

2023-10-23

A Perfect Storm Of Cyber Threats

AI, Hacktivism & Weaponised Deepfakes: The familiar threats are evolving as criminals modify their methods to damage organisations worldwide.

2023-10-23

Iranian State Sponsored Hackers On The Attack

Undetected Malware: Capable of intercepting MS Exchange to compromise incoming email, as well as upload & download files from the infected host.

2023-10-23

Cyber Security In Space Communications

Demand for satellite communications and escalating conflict in Ukraine and the M. East are driving concerns over securing space-based systems.

2023-10-23

ZTNA Is The Foundation Of Great VDI Deployments

Virtual DeskTop Infrastructure: Ensuring security in hosted desktop architectures can be a challenge. Zero Trust is the solution. By Karen Gondoly

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

National Authority Against Electronic Attacks (NAAEA) - Greece

National Authority Against Electronic Attacks (NAAEA) - Greece

The National Authority Against Electronic Attacks (NAAEA) is the national computer emergency response team of Greece.

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

Black Kite

Black Kite

Black Kite (formerly NormShield) provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring.

Center for Long-Term Cybersecurity (CLTC)

Center for Long-Term Cybersecurity (CLTC)

The Center for Long-Term Cybersecurity is developing and shaping cybersecurity research and practice based on a long-term vision of the internet and its future.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

SpyCloud

SpyCloud

SpyCloud is a leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts either directly or through product integrations.

Y-PARC

Y-PARC

Y-PARC is a center of excellence for cybersecurity, precision industries and medtech, fostering innovation and development and support for startups.

PatrOwl

PatrOwl

Automate your SecOps with PatrOwl, and start defending your assets efficiently.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.

KYND

KYND

KYND has created pioneering cyber risk technology that makes assessing, understanding, and managing business cyber risks easier and quicker than ever before.

Protexxa

Protexxa

Protexxa is a B2B SaaS cybersecurity platform that leverages Artificial Intelligence to rapidly identify, evaluate, predict, and resolve cyber issues for employees.

Upstack

Upstack

UPSTACK - One partner, end-to-end expertise, helping develop the solutions you need – when you need them.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

Certera

Certera

Certera is a modern and affordable SSL Certificate, Code Signing Certificate, and Cyber Security Services provider.