News

2022-03-09

Making Sense Of The Edge

Manufacturing’s big data has quickly become colossal, and Edge Computing can perform a vital role in the modern smart factory. By Martyn Williams

2022-03-08

Microsoft Exchange Exploited By ‘Cuba’

The Cuba ransomware gang target vulnerabilities on public-facing Microsoft Exchange software to detect susceptible networks.

2022-03-09

NATO Tests A Post-Quantum VPN

Post-Quantum technology provides different powerful algorithms to ensure security, even when facing attackers using quantum computing.

2022-03-08

Russia Threatens To Block Wikipedia

Don't Mention Ukraine: The national media regulator, Roskomnadzor, says that if editors don't comply, it will block all of Wikipedia from Russia

2022-03-08

Phishers Are Moving In On LinkedIn

Criminals are using LinkedIn to steal your data. If you get sent a link to LinkedIn.com via email, SMS/text or instant message, don't click on it.

2022-03-07

Mark Zuckerberg's Vision: How AI Will Unlock The Metaverse

The metaverse, a futuristic idea of virtual environments where users can work, socialise and play, will ultimately replace the mobile Internet.

2022-03-07

Update: The Online War In Ukraine

As events in Ukraine move quickly, it has become clear that this is the first armed conflict to use the Internet as an alternative front-line.

2022-03-04

Ukraine Targeted With Ghostwriter Phishing Campaign

An intense phishing campaign on Ukraine is linked to a Belarussian hacking group known to have attacked Poland and other EU member nations.

2022-03-03

Kaspersky Provokes Controversy

#BoycottKaspersky: Russian cyber security pioneer Eugene Kaspersky gets a stinging response to his comments about the invasion of Ukraine.

2022-03-02

Extortion: Most British Firms Pay The Ransom

British companies are the most likely to pay cyber criminals, with over 80% of businesses paying ransomware demands, twice the global average.

2022-03-01

E-Commerce Site Exposed Children Worldwide

A cloud data store was left accessible without authentication controls in place, exposing the sensitive data of hundreds of thousands of customers.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

Australian Cyber Security Centre (ACSC)

Australian Cyber Security Centre (ACSC)

The Australian Cyber Security Centre (ACSC) brings cyber security capabilities from across the Australian Government together into a single location.

Beame.io

Beame.io

Beame.io is an information security company that distributes open source authentication infrastructure based on encryption.

Pradeo

Pradeo

Pradeo Security offers a complete, automatic and seamless protection to mobile devices and applications, aligned with your organization security policy while preserving business agility.

CyberSeek

CyberSeek

CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.

Hacker House

Hacker House

Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied through active measures.

ABS Group

ABS Group

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations.

German Accelerator

German Accelerator

German Accelerator supports high-potential German startups in successfully entering the U.S. and Southeast Asian markets.

Digital Magics

Digital Magics

Digital Magics is an incubator for innovative startups which offer content and services with high technological value. Areas of focus include IoT, Enterprise Software, AI, Industry 4.0 and Blockchain.

Voxility

Voxility

Voxility provides Infrastructure-as-a-Service in the biggest Internet hubs in the world.

CyberUK

CyberUK

CYBERUK is the UK government’s flagship cyber security event and the authoritative event for the UK’s cyber security community.

Ignite Cyber

Ignite Cyber

IGNITE Cyber is focused on enabling secure technology adoption through intelligent business decisions. We are focused on providing a secure and stable business environment for everyone.

Techtron Business IT Services

Techtron Business IT Services

TECHTRON has been providing business IT services since 2004. Our focus is on SMBs and we are good at it. Our customers trust us, they love our high levels of service, and they love what we stand for.

Xantaro

Xantaro

Xantaro specializes in technologies, software and services for Carriers, ISPs, Hosting and Cloud Providers as well as for Operators of Data Centres and Campus Networks.

Softsource vBridge

Softsource vBridge

Softsource vBridge are an ICT systems integrator providing specialist technology solutions, professional services, technical expertise and data centre services.