News

2022-09-07

VPN Configuration: Understanding DNS Leaks & How to Prevent Them

VPNs are a great way to keep your browsing activity private, but you need to ensure you choose one that offers privacy protection. By Idrees Shafiq

2022-09-07

CIO & CISO Visions Leadership Summit - 9th to 11th October

Leadership Summit: Dedicated to IT and information security leaders; delivering the exact content, insight, connections & rewards you need.

2022-09-07

How To Prepare For A Cyber Crisis

Crisis preparedness is about minimising the consequences of an attack as quickly as possible & maintaining business continuity. By Jo De Vliegher

2022-09-06

Google Issues A Warning To Gmail Users

Google’s Threat Analysis Team is warning users of its Gmail service of a hacking exploit that has left some users exposed for over a year. 

2022-09-06

US Government Will Invest $15 Billion In National Cyber Security

2023 will be a good year for approved vendors as the US government goes large on defence & research spending on national cyber security.

2022-09-05

DMS Alerts Should Be Key To Organisations’ Security Orchestration

Document & Email Management System: DMS is an essential element in any organization's cyber security strategy. By Manuel Sanchez

2022-09-05

Chinese Internet Companies Required To Disclose Algorithm Data

Chinese Internet firms including Alibaba, Tencent & Tiktok's owner ByteDance have supplied details of their critical algorithms to China's regulator.

2022-09-05

Improving The Safety & Stability Of Artificial Intelligence

An important initiative to understand the risks and identify the specific steps to improve AI safety and stability in national security applications.

2022-09-05

Email Infection Chains Are Diversifying In 2022

Maldocs Are The Weapon Of Choice: Over 60% of malicious payloads are embedded in various document types attached to email. By Ian Porteous

2022-09-01

Understanding Fake News

Prebunking: Google has carried out research with valuable findings about how social media can actively pre-empt the spread of disinformation.

2022-09-01

Digital Banking & Cyber Crime

Digital banks face rapidly escalating threats as technological developments in cyber crime make it easier than ever for financial criminals. 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Security Magazine

Security Magazine

Security, the business magazine for security executives, focuses on management issues facing top security professionals and effective solutions being employed, both physical and cyber.

CyberDefcon

CyberDefcon

CyberDefcon is an independent organization dedicated to the pursuit of making the internet a safer place.

Cognni

Cognni

Cognni (formerly Shieldox) will make your InfoSec think like a human, right out of the box, so you can focus on the bigger picture, keeping the information flow safe.

Institute for Cybersecurity & Privacy (ICSP) -  University of Georgia

Institute for Cybersecurity & Privacy (ICSP) - University of Georgia

The goal of ICSP is to become a state hub for cybersecurity research and education, including multidisciplinary programs and research opportunities, outreach activities, and industry partnership.

_cyel

_cyel

_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

US Secret Service

US Secret Service

The US Secret Service has a pivotal role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance.

CUJO AI

CUJO AI

CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses.

Drootoo

Drootoo

Drootoo is transforming businesses and making them high performing entities with its unified cloud platform.

MazeBolt Technologies

MazeBolt Technologies

Israel-based MazeBolt is an innovation leader in cybersecurity, with over two decades of experience in pioneering DDoS protection solutions.

AVANTEC

AVANTEC

AVANTEC is the leading Swiss provider of IT security solutions in the areas of cloud, content, network and endpoint security.

Redhorse

Redhorse

Redhorse provides top-tier consulting to help clients address mission-critical government problems in National Security, Networking Technology, Energy and the Environment.

Alcon Maddox

Alcon Maddox

Alcon Maddox is a niche recruitment and executive search firm specialised in sourcing exceptional Cyber Security sales and commercial leadership talent. Serving clients across the Middle East & Europe

Segra

Segra

Segra owns and operates one of the nation’s largest fiber networks and provides best-in-class broadband and data security solutions throughout the Southeast and Mid-Atlantic.

Mogwai Labs

Mogwai Labs

Mogwai Labs deliver cutting-edge penetration tests, security assessments and trainings, to safeguard your applications, networks and cloud environments from cyber threats.

Averlon

Averlon

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility, Predictive Attack Intelligence and Rapid Remediation.