News

2022-06-23

Axonius Brings Its Platform To AWS Marketplace

Axonius makes it easier for AWS customers to monitor their cloud infrastructure & reduce the attack surface as they move assets to the public cloud.

2022-06-20

The Internet & Freedom Of The Press

The Internet was conceived as a borderless network permitting the free flow of information around the world, but barriers and controls are proliferating.

2022-06-21

Russia - Unplugged

Russia is all ready to drop off the worldwide web as a defensive measure to protect national infrastructure against foreign cyber attacks.

2022-06-22

Email Security Threat Report

Threat intelligence firm Armorblox has produced detailed research which examines the changing threat landscape for business email users.

2022-06-22

REvil Have Returned - Or Have They?

Criminals claiming to be from the extinct ransomware gang are targeting Akamai customers with a DDoS attack, demanding Bitcoin.

2022-06-13

Zoom Can Expose You To Cyber Attacks

The video-conference platform Zoom has disclosed four new software problems and vulnerabilities that can expose users to cyber attacks.

2022-06-15

Critical Business Systems Left Unmonitored & Insecure

Risky Business: Over 40% of companies don't include their core IT infrastructure systems in their routine cyber security monitoring activities.

2022-06-15

Using Artificial Intelligence In Military Operations

In modern warfare there is a necessity to keep pace with the volume and complexity of data being generated and now the US military is turning to AI.

2022-06-14

Ransomware’s Serious Effects On Cyber Security

Ransomware has rapidly evolved from a criminal 'malware incident' to a national security threat, in some cases successfully extorting $millions. 

2022-06-14

Estonia Fears Cyber Attacks Will Rise Because Of War In Ukraine

Estonia's cyber security is a critical investment and the nation is finding ways to improve resilience & build sophisticated offensive capabilities.

2022-05-31

An Airline Brought To A Standstill By Ransomware

India's SpiceJet was forced to cancel flights over a two day period by a second ransomware attack which targeted flight scheduling.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ProPay

ProPay

ProPay provides secure payment solutions for organizations ranging from small businesses to large enterprises requiring complex payment solutions.

Hague Security Delta (HSD)

Hague Security Delta (HSD)

The Hague Security Delta Campus is home of the leading cyber security cluster in Europe with an Innovation Centre, labs and training facilities.

Centre for Cyber Security (CFCS) - Denmark

Centre for Cyber Security (CFCS) - Denmark

The Centre for Cyber Security is the Danish national IT security authority, Network Security Service and Centre for Excellence within cyber security.

Ikerlan

Ikerlan

Ikerlan is an R&D technology centre specialising in areas including embedded systems, industrial automation and industrial cybersecurity.

SAS Institute

SAS Institute

SAS is a leader in business analytics software and services providing solutions for a wide range of critical business areas including risk management, compliance and fraud prevention.

Shieldfy

Shieldfy

Shieldfy is a cloud-based security shield for your website to protect it from cyber attacks and malwares.

Trinity Cyber

Trinity Cyber

Trinity Cyber’s patent-pending technology stops attacks before they reach internal networks,reducing risk and increasing cost to adversaries.

oneM2M

oneM2M

oneM2M is a global organization creating a scalable and interoperable standard for communications of devices and services used in M2M applications and the Internet of Things.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

ECHO Project

ECHO Project

The main objective of ECHO is to strengthen the cyber defence of the European Union, enhancing Europe’s technological sovereignty through effective and efficient multi-sector collaboration.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

Allentis

Allentis

Allentis provide adapted solutions to ensure the security and performance of your information system.

BIG Cyber

BIG Cyber

BIG Cyber is a specialized Managed Security Service Provider (MSSP) dedicated to bringing military grade cyber security technology to the gaming industry.

CCX Technologies

CCX Technologies

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets.

DATS Project

DATS Project

DATS Project enables the utilization of high computing power across a number of cybersecurity services, all on a pay-as-you-go basis, eliminating the need for upfront investment costs.

LiveAction

LiveAction

LiveAction’s Network Intelligence platform transforms complex data into actionable insights, providing organizations with a comprehensive view of their network.