News

2023-04-14

Has Someone Taken Out A Subscription Against You?

LogIn To Go Hacking: Criminals can now buy ransomware-as -a service just as cheaply as they can subscribe to Netflix. By Rob Quickenden

2023-04-13

What The West's Caution Over Chinese Tech Really Means

The focus on China as a malicious security threat is somewhat of a distraction. The real battle is in military and economic power. By Dario Betti

2023-04-12

Immutable Storage Is The One Solution That Will Keep Your Data Safe

Immutable data storage ensures data security and integrity in multi-cloud and hybrid-cloud environments in several ways. By Florian Malecki

2023-04-12

China Mandates Security Reviews For AI Services Like ChatGPT

AI Generated Content: China has published new regulations that require a security review of generative AI services before they can operate. 

2023-04-12

Maritime Technologies Are Transforming The Shipping Industry

The maritime industry is being transformed by digitalisation, AI, remote connectivity and autonomous ships - with consequences for cyber security.

2023-04-12

How Does IT Impact The Manufacturing Industry? All You Need To Know

IT tools like firewalls, intrusion detection systems & encryption technologies are essential to secure manufacturing operations from cyber threats.

2023-04-18

Russian Hacktivists Attack Canadian Gas Pipeline

Secret Pentagon Documents: A leak from US sources has exposed details of a Russian attack on Canada, as well as other critical intelligence.

2023-04-17

Attack On Israel’s Water Systems

Water & Sewage Systems: Multiple monitoring systems that are used to control irrigation networks were rendered inoperable by cyber attacks.

2023-04-17

FBI Seizes $112m From 'CryptoRom' Criminals

Cryptocurrency Romance: A $multimillion fraud involves faking a romantic interest in the victim, linked to crypto currency investment scams.

2023-04-14

Japan’s Leading Companies Exposed To Ransomware

An attack on the Japanese IT company Fujitsu could cause a surge in ransom attacks by criminal hackers on companies & their customers.

2023-04-12

Criminal Records Office Hit By A "Cyber Incident”

Britain's Criminal Records Office has suffered a two-month long cyber security “incident” resulting in a backlog of visa applications awaiting clearance.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

D-RisQ

D-RisQ

D-RisQ is focussed on delivering techniques to reduce the development costs of complex systems and software whilst maximising compliance

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

Masergy Communications

Masergy Communications

Masergy delivers hybrid networking, managed security and cloud communication solutions to enterprises around the globe.

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

Temasoft

Temasoft

TEMASOFT is a software company focused on developing security and infrastructure products.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

Whistic

Whistic

Whistic is a cloud-based platform that uses a unique approach to address the challenges of third-party risk management.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

Secure Cyber Defense

Secure Cyber Defense

Secure Cyber Defense provides expert cybersecurity consulting and managed detection and response services to companies, local government, schools and universities.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

Paubox

Paubox

Paubox offers secure, HIPAA compliant email and marketing solutions to fit the needs of modern healthcare organizations of every size.

HCS

HCS

HCS is an IT Company and Telecoms provider with an experienced team who are dedicated to ensuring our clients business systems are protected.

Oz Forensics

Oz Forensics

Oz Forensics is a global leader in preventing biometric and deepfake fraud. It is a developer of facial Liveness detection for Antifraud Biometric Software with high expertise in the Fintech market.

DATS Project

DATS Project

DATS Project enables the utilization of high computing power across a number of cybersecurity services, all on a pay-as-you-go basis, eliminating the need for upfront investment costs.

UFS Technology

UFS Technology

UFS, the bank technology outfitter for community banks, provides purpose-built, bank-exclusive technology services and solutions including cybersecurity.