News

2022-08-19

Blockchain Auditors Say $4m Crypto Theft Enabled By Logging Tech

A $4 million hack on several crypto currency wallet providers is attributed to a misconfiguration in a widely-used event-logging technology.

2022-08-17

Killnet Turn Their Attention To Lockheed Martin

Hackers targeted the supply of Lockheed Martin's advanced HIMARS rocket artillery supplied to Ukraine for use against Russian invaders.

2022-08-17

CISA & ACSC Name 2021’s Top Malware

New Capabilities & Evading Detection. The top malware types include RATs, banking Trojans, information stealers and ransomware. 

2022-08-17

Cyber Attack On London Crypto Exchange

Crypto Currency Exchange Under DDoS Siege: Britain's NCSC cyber security agency is investigating a suspected Russian revenge attack.

2022-08-24

Phishing Scams In 2022

The Commonest Form Of Attack: Phishing scams and their most popular variations can be recognised and prevented with knowledge & awareness. 

2022-08-16

Data Protection Must Be a Part of Every Cyber Security Strategy

CISOs Need A 360-degree View: Your data is your most important asset. If it's compromised by ransomware, you're dead in the water. By Florian Malecki

2022-08-16

Why You Must Report A Cyber Attack

Once you’ve suffered a cyber attack, most of the damage has been done. But ignoring your regulatory obligations will only make things worse.

2022-08-15

NCSC Cyber Security Breaches Survey 2022

What are the different cyber attacks that British organisations face, how are these organisations impacted and how do they respond?

2022-08-15

British Parliament Shuts Down Its TikTok Account

Parliament has closed its TikTok account only a few days after MPs raised concerns about the risk of data being passed to the Chinese government.

2022-08-15

The Top 3 Current Email Threats

Email is a vulnerable part of most organisations' infrastructure and can be used for delivering phishing scams, business compromise & ransomware.

2022-08-15

$3 Million Romance Fraudster Arrested

#YourAccountYourCrime: Police make a high profile arrest as Interpol launches a new campaign warning of the dangers of romance scams.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Logicalis

Logicalis

Logicalis are a leading provider of global IT solutions and managed services.

Agenci

Agenci

Agenci are specialists in cyber security and information security and deliver ISO 27001 Certification.

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

ANTIC is responsible for regulating the activities of electronic security and regulation of the Internet in Cameroon.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

CipherTrace

CipherTrace

CipherTrace develops cryptocurrency Anti-Money Laundering, cryptocurrency forensics, and blockchain threat intelligence solutions.

Sponge

Sponge

Sponge is a world-renowned digital learning provider on a mission to make learning unforgettable.

Dale Peterson

Dale Peterson

Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS.

Oceania Cyber Security Centre (OCSC)

Oceania Cyber Security Centre (OCSC)

OCSC engages with government and industry to conduct research, develop training opportunities and build capacity for responding to current and emerging cyber security issues.

GuardRails

GuardRails

GuardRails provides continuous security feedback that empowers developers to find, fix, and prevent vulnerabilities.

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI) is an independent, global think-tank. We bring together the world’s top global researchers to undertake ground-breaking research on blockchain technology.

Newtec Services

Newtec Services

IT should be responsive, adaptive, and smart. Now more than ever, you need a business that runs efficiently and can adapt to today's challenges. We can help with custom IT solutions.

M2MD Technologies

M2MD Technologies

M2MD Technologies offers solutions optimized for cellular IoT that provide stronger security, reduced costs, enhanced user experience, and ultimately generates higher returns for stakeholders.

Xperience

Xperience

Xperience solves our clients’ toughest challenges by delivering business efficiency through digital transformation solutions across cloud, managed IT, CRM and ERP.

RKVST

RKVST

RKVST is a powerful tool that builds trust in multi-party processes when it’s critical to have high assurance in data for confident decisions.

Hushmesh

Hushmesh

Hushmesh is a start-up aimed at securing the world’s digital infrastructure by developing develop the Mesh, a global information space with automated security built in.