News

2023-03-23

A 'Golden Pipeline' To Secure The Supply Chain

Building security into the development process is a priority for organisations aiming to avoid the risks of supply chain compromise. By Nurit Bielorai

2023-03-14

Cybersecurity Is No Longer The Sole Responsibility Of IT Specialists 

Wider recognition that cybersecurity is not the sole responsibility of one team, will hopefully see the burden on CISOs reduced. By Emily Quick

2023-03-10

Ransomware Gang Claims Responsibility For The Attack On Oakland

The Play ransomware gang has taken responsibility for a cyber attack on the City of Oakland that has disrupted IT systems since February.

2023-03-14

Meta Plans A Rival To Twitter 

A decentralized text-based app would allow Meta to take advantage of the current problems with Elon Musk's management of Twitter.

2023-03-13

Conflict Drives A Significant Increase In DDoS Attacks

Recent data analysis reveals increased DDoS attacks, combined with a significant link between geopolitical conflicts and these types of attacks.

2023-03-13

A New Tool For Protecting ML Systems Security

Arsenal: Microsoft and Mitre have developed a plug-in that combines open-source software tools to protect Machine Learning systems from attacks.

2023-03-13

A Warning From Ukraine About Russian Hackers

Gamaredon: Customised malware implants that can exfiltrate files of specific extensions, steal user credentials & screenshots of victims' computers.

2023-03-13

Barcelona Hospital Knocked Offline By Ransomware

The attack resulted in computers at the hospital's lab, emergency room & pharmacy at three main centres, plus external clinics being shut down.

2023-03-09

Which CI/CD Tools Can Promote Supply Chain Security?

Incorporating these tools into a supply chain security strategy can reduce risk, increase transparency & maintain the integrity of the supply chain.

2023-03-08

One Third Of Cyber Criminals Are Women

Unequal Female Engagement: A higher percentage of women participate in cyber crime than currently work in the cyber security industry.

2023-02-14

Two Cities In Californian  Attacked

Police Departments in the neighbouring Californian cities of Oakland and Modesto were knocked offline in a simultaneous ransomware attack.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

Synack

Synack

Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners.

CyberTech Network

CyberTech Network

CyberTECH is a global cybersecurity, Internet of Things (IoT) and Smart City network ecosystem and incubator operator.

Navaio IT Security

Navaio IT Security

Navaio helps clients with IT Security related challenges with a primary focus on Identity and Access Management, Data Governance, User Awareness and Cyber Resilience Services.

WhiteHawk

WhiteHawk

WhiteHawk is the first online Cyber Security Exchange. We help you understand your cyber risk and match you to tailored and affordable solutions.

Veratad Technologies

Veratad Technologies

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions.

NANDoff Data Recovery

NANDoff Data Recovery

NANDoff is a flat rate data recovery service. We serve the electronics industry around the globe 24/7.

LogicBoost Labs

LogicBoost Labs

LogicBoost Labs has the expertise, experience, funding and connections to make your startup succeed. We are always interested in new ways to change the world for the better.

FCI

FCI

FCI is a NIST-Based Managed Security Service Provider (MSSP) offering Cybersecurity Compliance Enablement Technologies & Services to Financial Services organizations.

EtherAuthority

EtherAuthority

EtherAuthority's engineering team has been helping blockchain businesses to secure their smart contract based assets since 2018.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

IS4IT Kritis

IS4IT Kritis

IS4IT is your partner for the successful planning, introduction and implementation of company-specific information security concepts.

Edera

Edera

Edera is changing the way containers are run and secured, making isolation a reality and fundamentally transforming computing in the process.

Crisis24

Crisis24

Crisis24 is a leading integrated risk management, crisis response, consulting, and global protective solutions firm.

Kaavalan

Kaavalan

Kaavalan was founded with a mission and a vision to protect you against cyber threats in the connected world.

Prismo Systems

Prismo Systems

Prismo provides a unified platform to secure software development across the entire SDLC and deployment on any cloud or on-premises infrastructure.

Reclaim Security

Reclaim Security

Reclaim Security is your always-on force multiplier, empowering security teams to eliminate threat exposure using your existing security stack.