News

2025-01-30

Ransomware Readiness: Transforming Threat Into Organizational Resilience

Boards that fail to prepare risk exposing their organisations to avoidable crises and losing the trust of their stakeholders. By James Eason

2025-01-29

CYRIN's New Attack Scenario - On An HVAC Scada System

Find & Kill Hidden Malware: Every unsecured IoT device, every connected endpoint has become a potential target for cyber attacks.

2025-01-29

Immutable Backup: Have The Last Word Against Ransomware

Data Security: The impact of ransomware is business critical & standard approaches to data security are no longer the answer. By Judy Kaldenberg

2025-01-28

British Companies Will Spend 30% More On Cyber Security

UK organisations predict they will increase their cyber security spending by an average 31% in 2025 - some anticipate increases of over 50%.

2025-01-28

China's DeepSeek AI Has Shaken The US Tech Industry 

The sudden emergence of a small Chinese startup capable of rivalling Silicon Valley’s top companies challenges assumptions about US AI technology.

2025-01-28

Proven Strategies For Building Resilience In Data Backup & Recovery

Backup & recovery is essential for business continuity, resilience and regulatory compliance, as well as customer confidence. By Jakob Østergaard

2025-01-27

Cyber Security - Trending In 2025

Staying engaged with the world of cyber security is essential and in 2025 it’s crucial to keep switched on to the evolving threat landscape. 

2025-01-25

London Tube Uses AI For Passengers Safety

Mind The Gap: London's tube will use AI to detect objects & people on the tracks, keeping passengers safe on underground station platforms.

2025-01-27

Data Privacy Week

January 27th - 31st: Data Privacy Week is an annual event to spread awareness about online privacy among both individuals and organisations.

2025-01-24

LinkedIn Accused Of Misusing Private Messages To Train AI Models

LinkedIn Premium users have filed a lawsuit accusing LinkedIn of sharing their private messages with other companies to train their AI models.

2025-01-22

Cyber Attack Disrupts Eindhoven University 

A leading technical research university in the Netherlands is still recovering after being effectively shutdown by a debilitating cyber attack.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Latham & Watkins LLP

Latham & Watkins LLP

Latham & Watkins is an international law firm. Practice areas include Data Privacy, Security and Cybercrime.

CGI Group

CGI Group

CGI is a leading IT and business process services provider. Services include IT consulting, Systems Integration, Application Development, Infrastructure, Business Processes, Digital IP.

Information Security Research Group - University of South Wales

Information Security Research Group - University of South Wales

The Information Security Research Group has an international reputation in the areas of network security, computer forensics and threat analysis.

PortSwigger

PortSwigger

PortSwigger's Burp Suite is an integrated platform for performing security testing of web applications.

Markel International

Markel International

Markel International is an international insurance company which looks after the commercial insurance needs of businesses. Specialist services include Cyber Risk insurance.

Packet Ninjas

Packet Ninjas

Packet Ninjas is a niche cyber security agency with specialized expertise in the use of digital intelligence to strengthen cyber security.

Infosec (T)

Infosec (T)

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

GlobalPass

GlobalPass

Covering 200+ countries with 78 000 databases, GlobalPass provides sophisticated facial biometrics verification and deep screening, delivering peace of mind to every client.

Cybersec Infohub

Cybersec Infohub

Cybersec Infohub is a Hong Kong government programme to enhance the exchange of cyber security information with industry and enterprises to jointly defend against cyber attacks.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

OWN

OWN

OWN (formerly SEKOIA) is a major French player in cybersecurity providing tailor-made, informed and adapted cyber support thanks to its DNA of passionate and committed experts.

Innefu Labs

Innefu Labs

Innefu is an Information Security R&D startup, providing cutting edge Information Security & Data Analytics solutions.

Securix

Securix

SECURIX AG delivers holistic IT security solutions that are tailored to the specific challenges and requirements of your company.

Interactive

Interactive

Interactive are a leading Australian IT service provider with services in Cloud, Cyber Security, Data Centres, Business Continuity, Hardware Maintenance, Digital Workplace, and Networks.

CarbonHelix

CarbonHelix

CarbonHelix provides cybersecurity services from US-based security operations centers that meet the highest compliance requirements.