News

2023-02-28

Securing Valuable Data

Crypto-segmentation is a vital tool in creating a security model that truly supports the need to safeguard valuable data assets. By Simon Pamplin

2023-03-01

Webinar: Firewall-as-a-service (FWaaS)

Discover the benefits of firewall-as-a-service (FWaaS) in a secure access service edge (SASE) model: WATCH NOW

2023-03-03

Digital ID Cards For Everyone In Britain

Sir Tony Blair and Lord Hague are recommending adoption of universal ID cards in an effort to use technology to transform the British economy.

2023-03-02

An Apocalyptic Cyber Event

Warning: The World Economic Forum Global Security Outlook Report 2023 predicts a “catastrophic cyber event" is on the way in the "near future".

2023-03-01

Calculating The Ransom Demand On The Victim’s Insurance

Informed Extortion: The ransomware group HardBit offers to set its ransom demands in relation to the victim organisation's insurance cover.

2023-02-28

Hackers Have Stolen GoDaddy's Source Code

GoDaddy has revealed that hackers gained access to its servers to install malware, with the potential to extort many of its hosting customers.

2023-03-10

Artificial Intelligence Today - How AI Works

Artificial Intelligence is becoming the main component of important emerging technologies like Big Data, Robotics and the Internet of Things.

2023-02-27

Australia’s Victoria Leads On National Cyber Strategy

Centre Of Excellence: Victoria is Australia’s leading cyber security hub, with a thriving tech base that is developing global security solutions.

2023-02-27

Start Thinking Like A Hacker

Curiosity Aggression & Persistence: To get inside the mind of a hacker, you need to think like a hacker and this is known as "white hat" hacking.

2023-02-27

Securing Hybrid Workplaces

Network Access: More organisations are working on streamlining their operations by connecting physical and digital security systems.

2023-02-27

Half Of British SMEs Have Been Attacked

Cyber criminals have identified SMEs as vulnerable because of new working practices, small IT teams and a lack of solutions knowledge. 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

Cloudbric

Cloudbric

Cloudbric is a cloud-based web security service, offering award-winning WAF, DDoS protection, and SSL, all in a full-service package.

Assuria

Assuria

Assuria Cyber Security solutions provide protective monitoring of systems and user activity across the whole IT infrastructure.

Beame.io

Beame.io

Beame.io is an information security company that distributes open source authentication infrastructure based on encryption.

Fingerprint Cards

Fingerprint Cards

Fingerprint Cards develops and produces biometric components and technologies that verify a person’s identity through the analysis and matching of an individual’s unique fingerprint.

Valtori

Valtori

Government ICT Centre Valtori provides sector-independent ICT services for the central government, while taking into account the special requirements related to security and preparedness.

Ledger

Ledger

Ledger is a leader in security and infrastructure solutions for cryptocurrencies and blockchain applications using its proprietary technology.

Jamf

Jamf

Jamf is the only Apple Enterprise Management solution of scale that remotely connects, manages and protects Apple users, devices and services.

Blumira

Blumira

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively.

Framatome

Framatome

Framatome Cybersecurity portfolio is directly inspired by its unique experience in nuclear safety for critical information systems and electrical systems design.

WhizHack Technologies

WhizHack Technologies

WhizHack's mission is to not only create a pipeline of cyber security products but also to empower people to sustainable innovation in securing digital assets of tomorrow.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

KATIM

KATIM

KATIM is a leader in the development of innovative secure communication products and solutions for governments and businesses.

Evervault

Evervault

Evervault provides engineers easy solutions to complex data security and compliance problems.

NMi Group

NMi Group

NMi Group is a global pioneer in mission-critical Testing, Inspection, Certification, and Calibration (TICC) services.

Inroad Technologies

Inroad Technologies

Inroad Technologies provide IT services that help keep your business computers, servers and networks secure and trouble-free.