News

2022-03-23

The Use Of Intellectual Property As An Instrument Of War

Ukraine has taken the rare step to use intellectual property as a war weapon by leaking critical operating details of a Russian Nuclear plant.

2022-03-29

LAPSUS$ Hackers Claim Responsibility For Large Scale Corporate Attacks

Source Code: Ubisoft may be the latest victim of hackers that have already attacked the chipmaker Nvidia and electronics giant Samsung.

2022-03-29

Conti Operates Like A Sophisticated Corporation

Hidden In Plain Sight: Staff think they are working for a legitmate Russian High-Tech firm, but in reality it is a notorious ransomware group.

2022-03-28

Operating Technology Security Issues Are Increasing

Industrial control systems have become more connected than ever and good cyber security practices to protect Operating Technology are vital

2022-03-28

Only A Few Employees Cause The Majority Of Breaches

Research has found that 4% of employees clicked 80% of phishing links and that 3% were responsible for 92% of malware events.

2022-03-22

US Moves Cyber Defences To High Alert

Americans should ‘lock their digital doors’ to prepare for a Russian cyber attack as federal agencies and busineses are urged to remain vigilant.

2022-03-22

Two Thirds Of Organisations Are Not Equipped To Deal With Cyber Threats

Only 27% of those surveyed have advanced threat protection on every endpoint device, placing access to corporate applications at great risk.

2022-03-19

Georgia Must Bolster Resilience To Information Warfare

The invasion of Ukraine has important lessons for the ex- soviet republic of Georgia, which now urgently needs to tackle Russian disinformation.

2022-03-18

Convergence & Digitalisation Create Problems For Energy Utilities

The convergence of previously separate sectors around renewable smart grids is eroding control over energy cyber security. By Steven O’Sullivan

2022-03-17

How To Improve Cyber Security Visibility & Control

Your cyber security strategy needs the right tools & services in place, integrated with effective employee education & testing. By Leyton Jefferies

2022-03-16

Trends In Application Connectivity & Network Management

Best Practice: There is a pressing need to focus on the risk inherent in applications when dealing with network security. By Avishai Wool

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

Sogeti

Sogeti

Sogeti deliver solutions that enable digital transformation and offer cutting-edge expertise in Cloud, Cybersecurity, Digital Manufacturing, Quality Assurance, Testing, and emerging technologies.

Karlsruhe Institute of Technology (KIT)

Karlsruhe Institute of Technology (KIT)

KIT is a leading research and education institutions with strong capabilities in information systems and security.

Dcoya

Dcoya

Dcoya's complete security awareness training program gives you out-of-the-box compliance with PCI-DSS, HIPAA, SOX and ISO regulations.

ZenMate

ZenMate

ZenMate is a Virtual Private Network services provider offering secure encrypted access to the internet.

Cansure

Cansure

Cansure is a leading insurance provider in Canada offering a broad range of property & casualty insurance solutions including Cyber & Data Breach insurance.

CPP Group UK

CPP Group UK

CPP Group UK develops products to help insurers add further value to their products and services through its innovative suite of new products in FinTech, InsurTech and cyber security.

Sigma IT

Sigma IT

SIGMA IT is one of the largest IT services organizations in EMEA region providing a full range of solutions and services including cybersecurity, data protection and business continuity.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

Internet 2.0

Internet 2.0

Internet 2.0 is a Cyber Security technology company with a core focus on developing affordable but sophisticated cyber security solutions.

Dr Web

Dr Web

Since 1992 the Russian anti-virus Dr.Web has been helping companies to keep their digital assets protected and operate in a secure digital environment.

Shield Capital

Shield Capital

Shield Capital helps founders build frontier solutions in cybersecurity, artificial intelligence, space & autonomy for commercial and government enterprises.

IBM Security

IBM Security

IBM manufactures and markets computer hardware, middleware and software, and offers hosting and consulting services in areas ranging from mainframe computers to nanotechnology.

RightSec

RightSec

RightSec is an emerging market leader and solution provider for cybersecurity and digital resiliency. We provide end to end solutions to suit your specific business lifecycle.

InQuest

InQuest

InQuest specialize in providing comprehensive network-based security solutions that empower organizations to protect their most critical assets: their people.

Blackwired

Blackwired

Blackwired has established a new category in cyber security with an intelligence-led model based on the USMC’s Combat Hunter programme ‘Left of Bang’.