News

2023-07-20

Sweden Issues An Order 'Stop Using Google Analytics'

Four Companies Fined; Customers' personal data was supplied to Google Analytics in a way that failed to meet EU technical security standards.

2023-07-13

A Perfect Storm For Cybercrime

Geopolitical Instability & Economic Uncertainty: Agility and flexibility are key, as threat actors are always evolving. By Fabien Rech

2023-07-18

A Million British Medical Patient Records Hacked

Details potentially exposed include name & contact details, next of kin information, ID numbers, study details, ethnicity, and even disability codes.

2023-07-19

British Spy Agency Was Hacked 20 Years Ago

Two decades have passed since malware designed to evade detection & steal sensitive data was first detected on a British government device.

2023-07-17

SCADA Is Dead, Or Is It?

Advanced Manufacturing: The traditional automation pyramid has collapsed and the next generation of solutions has arrived. By Stefan Reuther

2023-07-11

Twitter Threatens To Sue Meta Over Threads App

The Friendly Alternative: Twitter is threatening legal action against Meta accusing it of poaching former employees to create a “copycat”.

2023-07-14

A “Whole-of-Society" Approach To Cyber Crime

Active Cyber Defence: Britain's NCSC was notified of a suspicious email or website every five seconds in 2022 - that's 7.1m suspicious incidents.

2023-07-11

Zero Trust: A Paradigm Shift in Cybersecurity

Traditional perimeter-based security measures are no longer sufficient in safeguarding sensitive data and critical assets. By Helen Kruger

2023-07-10

Can AI Help Reduce The Cybersecurity Workforce Gap?

Cybersecurity Operations: Automation is now regarded as a primary workforce strategy that 80% of organisations intend to pursue. By Jamal Elmellas

2023-07-10

Malvertising Proliferates As Half Of Online Ads Are Now AI Generated 

With malware-as-a-service and AI generated text & images easily accessible, even attackers with little or no skills can create convincing ads.

2023-07-07

Discovered - High Risk Vulnerabilities Affecting A Leading Building Management System

Common Vulnerabilities & Exposures: An unintended vulnerability, built into the operating system, might allow attackers remote access.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Zscaler

Zscaler

Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud first world.

ThaiCERT

ThaiCERT

ThaiCERT is the national Computer Security Incident Response Team (CSIRT) for Thailand.

Mobile Mentor

Mobile Mentor

Mobile Mentor is an independent provider of enterprise mobility solutions in New Zealand and Australia.

United Security Providers

United Security Providers

United Security Providers is a leading specialist in information security, protecting IT infrastructures and applications for companies with high demands on security.

Hivint

Hivint

Hivint is a new kind of Information Security professional services company enabling collaboration between our clients to reduce unnecessary security spend.

KeepSolid

KeepSolid

KeepSolid is a Virtual Private Network services provider offering secure encrypted access to the internet.

Arcturus Security

Arcturus Security

Arcturus is a CREST-approved cyber security consultancy created by experts in the field.

Gotham Digital Science (GDS)

Gotham Digital Science (GDS)

Gotham Digital Science is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

Nagios

Nagios

Nagios is a powerful tool that provides you with instant awareness of your organization’s mission-critical IT infrastructure.

Pathlock

Pathlock

Pathlock (formerly Greenlight) help enterprises and organizations automate the enforcement of any process, access, or IT general control, for any business application.

Aunalytics

Aunalytics

Aunalytics is a data platform company that delivers insights as a service to answer your most important IT and business questions.

Nokod Security

Nokod Security

Nokod Security delivers an application security platform for low-code / no-code custom applications and Robotic Process Automation (RPA).

Apollo Secure

Apollo Secure

Apollo is an automated cybersecurity platform for startups and small businesses to achieve and maintain security compliance.

eGeneration

eGeneration

eGeneration is one of the leading technology solutions and system integration companies in Bangladesh.

Tamnoon

Tamnoon

Tamnoon is the Managed Cloud Detection and Response platform that helps you turn CNAPP and CSPM alerts into action and fortify your cloud security posture.