News

2025-01-17

British Regulator Will Investigate Google

Market Dominance: Google is being investigated by the UK Competition & Markets Authority over its web search & advertising practices.

2025-01-21

TikTok Reprieved By Trump

President Trump Stops US TikTok Ban: TikTok will "most likely" be handed a 90-day reprieve just a day before the company said it would "go dark". 

2025-01-20

Salt Typhoon - The Chinese Telecom Hack

What's Next?: Their attacks have impressed by the skill, persistence and ability of Salt Typhoon hackers to embed in computer networks.

2025-01-17

Tackling Cyber Threats In The Public Sector

Phishing-Resistance Is Key: Public sector organisations need to have the necessary tools to protect against cyber threats. By Niall McConachie

2025-01-17

President Biden’s Final Cyber Security Executive Order  

Parting Shot: It Is unclear how much of Joe Biden’s last-minute directive to strengthen US national cyber security will be embraced by Donald Trump.

2025-01-15

British Government Will Ban Payment For Ransom Attacks 

Deterring Cyber Crime: The intention is to make public sector & infrastructure organisations less attractive targets for ransomware gangs.

2025-01-15

Understanding The Importance of Kernel-Level Security

Is Your ICS Kernel Vulnerable?: The kernel is at the core of any industrial operating system - protecting its security is essential. By Tim Reilly

2025-01-15

The International Race To Lead In Quantum Technology 

Quantum computers will create extraordinary opportunities for those organisations and nations able to develop and take advantage of them.

2025-01-14

Cyber Attack On Slovakia’s Land Registry

Meet The Neighbours: Ukraine is blamed for a crippling ransom attack on a government agency, described as the largest in the history of Slovakia.

2025-01-11

British Online Safety Act Takes Effect

Online platforms have three months to assess the risk of their users encountering illegal content and implement safety measures or face prosecution.

2025-01-08

Which Cybersecurity Trends Will Dominate 2025?

Organisations need to brace for a wave of threats driven by advanced technologies and increasingly sophisticated attack vectors. By Paul McLatchie

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

International Federation of Robotics (IFR)

International Federation of Robotics (IFR)

The International Federation of Robotics connects the world of robotics around the globe. Our members come from the robotics industry, industry associations and research & development institutes.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

Bluink

Bluink

Bluink specializes in identity and access management and customer identity verification, using your smartphone as a strong authenticator and secure identity store.

Surevine

Surevine

Surevine builds secure, scalable collaboration solutions for the most security conscious organisations, enabling collaboration on their most sensitive information.

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

Accertify

Accertify

Accertify is a leading provider of fraud prevention, chargeback management, and payment gateway solutions.

EMnify

EMnify

EMnify is a Software-as-a-Service (SaaS) company, revolutionizing cellular Internet of Things (IoT).

GitGuardian

GitGuardian

Enable developers, ops, security and compliance professionals to enforce security policies across public and private code, and other data sources as well

Data Theorem

Data Theorem

Data Theorem is a leading provider in modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere.

Cyentia Institute

Cyentia Institute

The Cyentia Institute is a research & data science firm with a mission to advance knowledge in the cybersecurity industry.

SAP National Security Services (NS2)

SAP National Security Services (NS2)

SAP NS2 are dedicated to delivering the best of SAP innovation, from cloud to predictive analytics; machine learning to data fusion.

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

OmniCyber Security

OmniCyber Security

Omni is a cyber security firm specialising in Penetration Testing, Managed Security and Compliance.

Fireblocks

Fireblocks

Fireblocks is a digital asset security platform that helps financial institutions protect digital assets from theft or hackers.

ARGOS Cloud Security

ARGOS Cloud Security

ARGOS aims to simplify and strengthen cloud security, by creating a visual map of security vulnerabilities, to your priceless information stored in any cloud provider environment.

Spirit Technology Solutions

Spirit Technology Solutions

Spirit Technology Solutions is a modern workplace services provider committed to delivering solutions that embody our core principles of security, sustainability, and scalability.