News

2022-05-03

Government Cloud On-Ramping

Britain is wasting huge sums on outdated systems, when reliable, lower cost cloud-based alternatives are readily available. By Paul German

2022-05-02

Cyber Attacks On Ukraine Are Increasing

Espionage & Intelligence: Attacks on Ukraine targets have tripled since the attempted invasion when compared with the same period last year.

2022-05-02

Three Vital Concerns For Companies Running Hybrid Cloud Environments

The threat of a data breach and data loss is a dangerous possibility for companies that run hybrid cloud environments. By Florian Malecki

2022-04-29

FBI Is Looking For BlackCat

Wanted: IP addresses, Bitcoin addresses, transaction IDs, communications and a sample of an encrypted file to catch prolific criminals.

2022-05-06

Enhance Security In Your AWS Cloud

AWS SECURITY WEBINAR: Securing your cloud environment with endpoint and network detection and response (EDR/NDR) technologies.

2022-04-29

The Role Of AI In Data Analysis

Today, AI is capable of performing at the same skill level as humans but with the advantages of high scalability and no need for pauses.

2022-04-28

Cyber Criminals Increasingly Focus On Mobile Devices

Mobile platforms supply an ever increasing number of distributed endpoints and their security is no longer an option for businesses. By Ian Porteous.

2022-04-28

Identity Access Management Essentials

Identity & Access Management (IAM) is a critical element of an organisation's IT infrastructure and its importance is growing. By Stefan Nilsson

2022-04-27

European Union Has Rules On Illegal Online Content

The EU Digital Services Act will give effect to the principle that what is illegal offline, should be illegal online, with very big penalties.

2022-04-27

Cyber Security Training Reduces Cyber Attacks

Take Action: Cyber criminals often choose to attack organisations with weak cyber training expertise. We recommned you GoCyber.

2022-04-27

Twitter, Free Speech & Disinformation

Elon Musk’s purchase of Twitter might mean the site will do even less to moderate extremism, hate speech, fake news and disinformation.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

Nuspire

Nuspire

Nuspire provide services to protect your network with best-in-class managed detection and response, allowing you to stay focused on managing your business.

TrustMAPP

TrustMAPP

TrustMAPP automates cybersecurity & privacy assessments, with universal workflow, allowing teams to generate analytics and recommendations to align priorities for improvement.

Q-Net Security

Q-Net Security

Protect your critical networks. Q-Net Security make hardware that provides the strongest drop-in security for your existing critical infrastructure.

HMS Networks

HMS Networks

HMS stands for Hardware meets Software. Our technology enables industrial hardware to communicate and share information with software and systems.

Grip Security

Grip Security

Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem.

SECUINFRA

SECUINFRA

SECUINFRA has been supporting companies in detecting, analyzing and defending against cyber attacks since 2010.

BriskInfosec Technology & Consulting

BriskInfosec Technology & Consulting

BriskInfosec provides information security services, products and compliance solutions to our customers.

Teleport

Teleport

Teleport is a remote-first technology company. We enable engineers to quickly access any computing resource anywhere on the planet.

IgmGuru

IgmGuru

Igmguru offers certification online training courses for IT professionals and students. Get certified with high-in-demand job-oriented professional courses.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

ThreatNG Security

ThreatNG Security

ThreatNG is redefining external attack surface management (EASM) and digital risk protection with a platform of unmatched breadth, depth, and capabilities in thwarting technical and business threats.

Evervault

Evervault

Evervault provides engineers easy solutions to complex data security and compliance problems.

Dotsquares

Dotsquares

Dotsquares leverage the latest web and mobile technologies to build, grow and support your business.

L&T Technology Services (LTTS)

L&T Technology Services (LTTS)

L&T Technology Services Limited (LTTS) is a global leader in Engineering and R&D (ER&D) services.