News

2021-07-06

$70m Ransom Demand To Restore Hacked Data

The REvil cyber crime group have significantly raised the bar for the level of ransom demanded in their widespread attack on Kaseya customers.

2021-07-05

Technical Debt Is A Serious Threat To Innovation

Technical debt is a technical design or development choice made for short-term benefit with long-term consequences for cyber security.

2021-07-05

Pentagon CISO Accused Of Leaking Classified Intel

The top Pentagon official, who was overseeing its new cyber security initiative, has been placed on indefinite leave while being investigated.

2021-07-21

History, Robotics, Artificial Intelligence & Bio-Technology

The rate of technological development is happening very fast, blurring physical, digital and biological elements, creating a new techno-reality.

2021-07-05

Data Dominance: EU Investigates Google

The investigation will examine Google's role in collecting data, selling advertising space and acting as an online-advertising intermediary.

2021-07-05

Artificial Intelligence Can Reduce Cyber Attacks

AI is an effective solution to protect organisations from cyber attacks, but it can also be used by hackers to launch complex, automated attacks.

2021-07-03

Massive Attack: 200+ US Organisations Hacked

In a replica of SolarWinds, over 200 US organisatations have been struck with ransomware via a large scale infection of their IT supply chain.

2021-07-02

Ransomware Attack Protection

Ransomware has become one of the biggest threats organisations face and criminals are extorting increasingly large sums from victims.

2021-07-01

How To Write Learning Objectives For Cyber Security Training

It is vital to implement clear learning objectives for the delivery of cyber security training and implementation. Here's how. By Jessica Fender

2021-06-30

US Companies Aren’t Preparing For Cyber Attacks

Business leaders seem unwilling to act until after the event. They must step up now and realise that cyber security is not optional - it’s essential.

2021-06-30

How To Prevent Healthcare Data Breaches

Healthcare is the most highly targeted sector for criminals trying to steal data, which calls for stringent security measures. By Narendra Sahoo

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TechInsurance

TechInsurance

TechInsurance is America's top technology insurance company offering a range of technology related products including Cyber Liability insurance.

Cura Software Solutions

Cura Software Solutions

Cura Software Solutions (formerly Cura Technologies) is a market-leader in Governance, Risk and Compliance (GRC) enterprise applications.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

ThreadStone Cyber Security

ThreadStone Cyber Security

ThreadStone Cyber Security offer reliable, practical and affordable cyber security solutions for both large and smaller organizations that we develop and deliver ourselves from Europe.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

WolfSSL

WolfSSL

wolfSSL is an embedded SSL/TLS library providing secure communication for IoT, smart grid, connected home, routers, applications, games, phones, and more.

Secuvant

Secuvant

Secuvant is an independent IT Security firm providing enterprise-grade IT security services to mid-market organizations.

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance combines insurance expertise with cybersecurity and data talent to deliver clear, effective solutions to protect you for the cyberrisks of today—and tomorrow.

IQ4 - Cybersecurity Workforce Alliance (CWA)

IQ4 - Cybersecurity Workforce Alliance (CWA)

Cybersecurity Workforce Alliance, a division of iQ4, is an organization comprised of a diverse range of professionals dedicated to the development of the cybersecurity workforce.

Viria

Viria

Viria is an information and security technology solution provider that promotes digitalization in a secure way.

BDO Global

BDO Global

BDO is an international network of public accounting, tax and advisory firms which perform professional services under the name of BDO.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Surfshark

Surfshark

Surfshark is a cybersecurity company focused on developing humanized privacy & security protection solutions to secure people's digital lives.

5S Technologies

5S Technologies

5S Technologies is a regional IT solutions and services provider based in Cary, NC and serving the Carolinas.

Fraud.net

Fraud.net

Fraud.net operates the first end-to-end fraud management and revenue enhancement ecosystem specifically built for digital enterprises and fintechs globally.

TENEX

TENEX

TENEX is a cybersecurity company leveraging advanced artificial intelligence and human expertise to transform enterprise security.