News

2022-05-09

A History Of Cyber Security

Understanding the history of cyber security may help shed some light on how to take effective steps to keep Internet users safe today.

2022-05-09

Only 3% Of Cyber Security Startups Are Led By Women

A new report finds that of the 654 startups that raised more than $1,000,000 in funding in 2020 and 2021, only 22 were led by female CEOs.

2022-05-09

Is Europe Ready For Cyber Warfare?

The European Commission wants an EU-wide “cyber shield” of security operations centres to provide an early-warning system for cyber attack.

2022-05-06

Cybersecurity Lessons From Ancient History

Nothing New: Ransomware operates in the same way as the Trojan Horse and history can teach us a lot about cyber security today. By Phil Ashley

2022-05-05

Are Your Employees The Weakest Link Against Cyber Crime?

The vast majority of cyber attacks involve employee error. A well-trained workforce is the greatest defence you can have. By Steve Whiter

2022-05-05

Find Your Security Vulnerability Before Hackers Do

Where is your network the most vulnerable? Here is a three point plan to fix the problem now, before hackers exploit it. By Keith Bromley

2022-05-05

Predictive Analytics Are The Future For Cyber Security

Organisations need a strategy to protect themselves and their data from growing cyber security threats. Predictive Analytics can help do that.

2022-05-04

Five Eyes Warn Of Russian Cyber Attacks

Five Eyes intelligence call for immediate action by critical infrastructure organisations to “prepare for and mitigate potential cyber threats”.

2022-05-04

Improve Your Password Security

Using the same passwords on multiple websites increases your cyber risk. Here is how to better protect your online accounts. By Adenike Cosgrove

2022-05-04

Hackers Are Blasting Facebook Users With Phishing Emails

A False Sense Of Urgency: A large scale phishing campaign is targeting Facebook users to steal their passwords & other personal information.

2022-05-03

Lapsus$ Hackers Targeted T-Mobile

Teenage Rampage: The Lapsus$ hacking group got acces to T-Mobile’s source code using stolen credentials, before their final arrest.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Fredda Stanza

Fredda Stanza

Fredda Stanza specialize in Information Security and Forensics Consulting.

Trust Guard

Trust Guard

Trust Guard services provide complete security for your website.

Wooxo

Wooxo

Wooxo provides business security and continuity solutions to protect business data for organisation of all sizes.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

Center for Strategic Cyberspace & International Studies (CSCIS)

Center for Strategic Cyberspace & International Studies (CSCIS)

CSCIS seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

TrustInSoft

TrustInSoft

TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

Blueskytec (BST)

Blueskytec (BST)

Blueskytec has applied its experience of over three decades of working in the field of embedded systems and encryption to provide a scalable and appropriate technology for cyber-physical devices.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

Trianz

Trianz

Trianz Cybersecurity Services are Powered by One of the World’s Largest Databases on Digital Transformation. We Understand Evolving Risks, Technologies and Best Practices.

NGN International

NGN International

NGN International is a full-fledged systems integrator and managed security services provider established in 2015 in Bahrain.

Sec-Ops

Sec-Ops

Sec-Ops is a forward thinking cyber security company, formed by a group of security enthusiasts with years of experience and backgrounds in the technology and the government industries.

Radiant Security

Radiant Security

Radiant Security offers an AI-powered security co-pilot for Security Operations Centers (SOCs). Reinforce your SOC with an AI assistant.

Arsen Cybersecurity

Arsen Cybersecurity

Arsen is a French cybersecurity startup, dedicated to enhancing human behaviors in cybersecurity.