News

2023-06-13

Two Thirds Of Organizations Suffer Breaches Due To WFH

Document Security: Remote workplaces offer unique challenges to data security and the security risks are too costly to ignore. By Kyle Mitchell

2023-06-13

Manchester University Hacked

One of the UK's largest and most successful education & research centres has been breached with some of its critical data exposed.

2023-06-13

How To Leverage AI For Real-Time User Verification

Businesses can now leverage AI algorithms to improve their user verification procedures & provide real-time security safeguards. By Ben Hartwig

2023-06-13

Providing Reliable Solutions For Businesses In The Emirates

IT Support UAE: From small startups to large corporations, having reliable IT support and technical expertise is crucial for smooth operations.

2023-06-12

Exploring The Benefits Of Continuous Compliance

Compliance Is A Business Driver: Continuous compliance has the ability to boost trust, drive business, and enhance security. By Adam Markowitz

2023-06-12

To Succeed With Zero Trust, First Define Success

When well-executed, Zero Trust strengthens an organization’s security posture, reducing the blast radius of inevitable breaches. By John Linford

2023-06-10

Play Ransomware Gang Attack A Spanish Bank

PlayCrypt: The latest high-profile attack conducted by a ransomware group which is becoming widely known for its file encryption exploits.

2023-06-12

XDR vs. SIEM: Do You Need One or Both?

The complexity & volume of security data present challenges for traditional SIEM solutions, leading to the emergence of new offerings like XDR.

2023-06-09

More Than 340 Million User Accounts Breached So Far This Year

A String Of Large Scale Incidents: In the first four months of 2023 business data breach incidents have already affected over 340 million users.

2023-06-08

A House Of Cards

The Risk Of Losing User Trust: The Capita incident showcases the importance of cybersecurity in Digital Transformation. By Paul Holland

2023-06-07

Ransomware Trends In The Aviation & Maritime Industries

Transport sector organisations have a distinctive profile from an attacker’s perspective, making them an especially lucrative target.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

aizoOn Technology Consulting

aizoOn Technology Consulting

aizoOn is a technology consulting company offering a range of services including IoT & embedded security, mobile security, cybersecurity assessments, risk & compliance, network monitoring and more.

City Security Magazine

City Security Magazine

City Security magazine helps promote best security practices and keep businesses informed on a wide variety of security-related issues.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

CybergymIEC

CybergymIEC

CybergymIEC is a global leader in cyber defense solutions and training services.

Sabasai

Sabasai

Sabasai specialises in all aspects of insider threat management from training and education to building security frameworks and insider threat programs to on-site risk & vulnerability assessments.

Trinity Cyber

Trinity Cyber

Trinity Cyber’s patent-pending technology stops attacks before they reach internal networks,reducing risk and increasing cost to adversaries.

Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation Hub (BDIH)

The aim of the BDIH initiative is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of industry 4.0.

Stamus Networks

Stamus Networks

Stamus Networks offers Scirius Security Platform solutions that marry real-time network traffic data with enhanced Suricata intrusion detection (IDS) and an advanced analytics engine.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

DataViper

DataViper

DataViper is a threat intelligence platform designed for organizations, investigators, and law enforcement.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

AirITSystems

AirITSystems

AirITSystems offer companies comprehensive IT security solutions that take all security considerations into account and are tailored to your business.

Speedinvest

Speedinvest

Speedinvest is one of Europe’s most active early-stage investors with a focus on Deep Tech, Fintech, Industrial Tech, Network Effects, and Digital Health.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

Enzen

Enzen

Enzen is a global knowledge practice that provides consulting, technology, engineering, operating and innovation services to the energy and utility sectors.

Orca Tech

Orca Tech

Orca Tech brings together a portfolio of complimentary vendor in the IT security industry to help provide a complete solution to meet the requirements of our Partners across all sectors.