News

2022-04-26

Digital Experience Monitoring - The Future Of Remote & Hybrid Work

Digital Experience Management is the ideal strategy for measuring the impact of the digital experience on productivity. By Naveena Srinivas

2022-04-26

Cyber Security Weak Points That Business Leaders Should Know About

Security Threats Are't Going Away: Board members need to understand their risks from a business continuity and a cyber security standpoint.

2022-04-26

Iran Has Stopped A Large Scale Infrastructure Attack

Unamed cyber attackers were planning to exploit a security gap in the software most widely used by infrastructure organisations in Iran.

2022-04-26

Elon Musk's Deal To Buy Twitter

Twitter is in the final stages of negotiation for the innovative automotive & space billionaire to buy the social media platform. What's next?

2022-04-25

Business Leaders Have A Legal Liability When A Data Breach Occurs

Cyber security starts at the top, because if top management don't take cyber security seriously, neither will the front-line employees. 

2022-04-25

Half Of Phishing Emails Target LinkedIn Accounts

User Beware: The professional networking website is one of the most popular brands targeted by cyber criminals in phishing attacks.

2022-04-25

The Cyber Delusion Challenge For Small & Medium Businesses

With the increased sophistication of cybercrime tools, what can SMBs do to combat the mounting threats that they face? By John Davis

2022-04-22

Identity & Authentication For Mobile Users

For mobile users, there is a clear gap in the level of trust between the level of expectations from consumers versus real experience. By Dario Betti

2022-04-25

The Vital Importance Of Pen Testing

Penetration Testing is vital to protecting your organisation against attack and reassuring your employees, customers and regulatory authorities. 

2022-04-20

Hackers Plan Attacks On Key US Industrial Control Systems

Hackers have new tools to get full system access to a number of Industrial Control System and Supervisory Control & Data Acquisition devices.

2022-04-20

Pegasus Spyware Used To Target British Prime Minister

Evidence found of surveillance software being present on devices associated with the British Prime Minister’s Office at 10 Downing Street.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IGEL Technology

IGEL Technology

IGEL Technology is one of the world's leading thin client vendors. Thin clients increase data security and compliance.

KELA

KELA

KELA's powerful cybercrime intelligence platform uncovers and neutralizes the most relevant cybersecurity threats coming from the hardest-to-reach places on the internet.

Forter

Forter

Forter provides new generation fraud prevention to meet the challenges faced by modern enterprise e-commerce.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Compnet

Compnet

Compnet is a service company that assists customers in integrating complete ICT systems including network infrastructure and security solutions.

Gospel Technology

Gospel Technology

Gospel presents a totally new way of accessing and controlling data which is enterprise grade scalable, highly resilient, and secure.

Incopro

Incopro

Incopro is an online IP and brand protection software provider that arms brand owners with actionable intelligence to combat online and offline intellectual property and copyright infringements.

Splone

Splone

Splone is a Berlin-based IT security research team and consultancy. We help improve IT-security by offering red team assements, penetration tests, audits and customized consulting.

Cynance

Cynance

Cynance are an award-winning, independent cyber security specialist and part of the Transputec family of companies.

Forever Group

Forever Group

Forever Group is a Managed Services Provider specialising in Telecommunications, IT Support, and Cyber Security.

Twingate

Twingate

Twingate help organizations secure and manage access to their technology resources in a world where people work from anywhere.

Mayer Brown

Mayer Brown

Mayer Brown is a global law firm. We have deep experience in high-stakes litigation and complex transactions across industry sectors including the global financial services industry.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.

Resonance Security

Resonance Security

Resonance offers powerful cybersecurity aggregation software that makes protecting against full spectrum cybersecurity threats effortless no matter what your technical level, budget, or scope.

Hydden

Hydden

Hydden gives security teams the ability to create a solid foundation to build a truly next-gen identity security practice by bridging the gaps between siloed teams and technologies.

UBDS Digital

UBDS Digital

UBDS Digital is your Digital Lifecycle Partner for Secure Cloud Transformation.