News

2021-09-23

10,000 Cloud Security Certified Professionals

CCSP: The world’s largest non-profit membership association of certified cyber security professionals (ISC)² has reached an important milestone.

2021-09-22

North America VPN Market Will Soon Be Worth $70 Bn

Widespread use of mobile devices and the implementation of BYOD rules are driving the rapid development of the N. American VPN market.

2021-09-22

The CISO's Job Is Getting More Complex

Evidence suggests that the the role of a CISO has never been more complex, challenging & critical to the resilience of the organisation they work for.

2021-09-22

EU Proposes Legislation To Secure Connected Devices

The European Commission has put forward a number of policy proposals to introduce mandatory cyber security standards for connected devices. 

2021-09-22

US Intelligence Hackers Available For Hire

Three former US intelligence operatives have admitted to breaking US laws by carrying out hacking operations for the United Arab Emirates.

2021-09-21

Cyberspace & Outer Space Are New Frontiers For National Security

Countries need to address the intersection between outer space and cyberspace for their security and defence policies. By Eliza Sadler

2021-09-21

Zero Trust Architecture - No Longer A ‘Nice to Have’

A Zero Trust mindset is now an operational necessity & there are some essential components organisations must adopt. By Paul German

2021-09-20

AUKUS Defence Pact Between US, Britain & Australia

Strategic Shift: Its not just about submarines - shared capabilities will include cyber security, quantum computing and artificial intelligence.

2021-09-16

Everything You Need To Know About Business Password Safety

The majority of data breaches happen because of poor password security and here are the main threats to password safety. By Emily Matthews

2021-09-17

Australia’s Critical Infrastructure Is Under Constant Attack

A cyber attack is being reported in Australia every 7.8 minutes as sophisticated hackers target critical infrastructure and essential services.

2021-09-17

Industrial Companies At Risk As Attacks Double

Unprepared: The industrial sector experienced a 91% jump in attacks and a 54% rise in malware-related attacks in 2020 compared to 2019.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

WhiteHat Security

WhiteHat Security

WhiteHat’s products enable customers to “Hack Yourself First” so that they gain a greater understanding of the actual risk to their business.

Purdicom

Purdicom

Purdicom (formerly known as Selcoms) is an award winning distributor specialising in Wireless, Cloud & Security technologies.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

CopSonic

CopSonic

Copsonic provide a technology solution based on ultrasonic waves to send secure and encrypted data between two devices in order to achieve authentication.

Worldline

Worldline

Worldline IIoT solutions allow industrial companies to start their digital transformation journey with industrial level cyber security standards (IEC 62443 ready).

Civic Technologies

Civic Technologies

Civic’s Secure Identity Platform (SIP) uses a verified identity for multi-factor authentication on web and mobile apps without the need for usernames or passwords.

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.

Cyber Security Authority (CSA) - Ghana

Cyber Security Authority (CSA) - Ghana

The Cyber Security Authority has been established to regulate cybersecurity activities in Ghana.

SecureStream Technologies

SecureStream Technologies

SecureStream Technologies have built the IoT SafetyNet - the Network Security Analytics platform to Eliminate Security Threats, Guarantee Privacy, Ensure Compliance, Simply & Easily.

Red Goat Cyber Security

Red Goat Cyber Security

Red Goat Cyber Security have created excellent, informative and interactive Social Engineering Awareness training which is suitable for all levels of staff.

Trustifi

Trustifi

Trustifi leads the market with the easiest to use and deploy email security products, providing both inbound and outbound email security from a single vendor.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

Icon Information Systems (ICONIS)

Icon Information Systems (ICONIS)

ICONIS is an integrated infrastructure and service provider, offering unified Information Technology (IT) solutions globally.

Netia

Netia

Netia is a Polish telecommunications company providing a range of business services including network solutions, communications, data centre and cloud, and cybersecurity.