News

2024-12-27

IoT Devices Infected With Pre-Installed Malware

BadBox: Android malware embedded in the device’s firmware, which enables interception of private credentials & can install other malicious software.

2024-12-31

Ireland - The EU's Data Repository

The growth of the cloud storage sector in Ireland is so rapid that it is threatening the country’s legally binding commitments to 'Net-Zero'.

2025-01-02

Cybersecurity: What Can We Expect In 2025?

The prospect is for continued turbulence, shaped by evolving attack vectors, regulatory pressures & geopolitical conflict. By Vincent Lomba

2024-12-27

Means, Motives & Opportunities

Relentless Cyber Criminals: Exploring the risk factors that will drive cyber attacks and the threats they will generate in 2025. By Kurt Thomas

2024-12-30

Cybersecurity Measures To Enhance Data Security In 2025

As we enter 2025, here are four predictions for organisations who want to take steps to protect themselves from cyber attacks. By Rick Goud

2024-12-31

What Are The Key Trends That Will Shape Tech In 2025?

Weaponised AI & Compliance: Executives at NinjaOne identify four key trends that will shape the technology industry in 2025 and beyond. 

2024-12-30

How CISOs Can Master Cyber Attack Communications

Under Pressure: The modern CISO's responsibility goes beyond technical leadership, especially when things go wrong. By Mark Bowling

2024-12-27

Using AI To Its Full Cybersecurity Potential

2024 Was The Year Of AI: We spoke to four industry experts to discover their predictions for 2025 when it comes to AI and its pros and cons. 

2024-12-20

Cybersecurity Challenges In Managing Learning Centres

Rising Threats: Understanding cyber threats to education centers and how you can leverage secure management systems to counter them.

2024-12-21

Cyber Attacks On Ukraine Government Agencies

Russia launches a mass cyber attack on Ukraine’s Justice Department, plus various state registries and government records offices.

2024-12-23

Quantum Computing Nears A Turning Point

From Promise To Reality: As quantum capabilities evolve, organizations must face the urgent need for quantum-safe solutions. By Tim Callan

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

Compumatica

Compumatica

Compumatica is a leading European ICT security manufacturer for cybersecurity and encryption products. Solutions include network security, SCADA/ICS security, Mobile/BYOD and email encryption.

CyberSure

CyberSure

CyberSure is a programme of collaborations and exchanges between researchers aimed at developing a framework for creating and managing cyber insurance policy for cyber systems.

Marvell Technology Group

Marvell Technology Group

Marvell is a semiconductor company providing solutions for storage, processing, networking, security and connectivity.

Arctic Wolf Networks

Arctic Wolf Networks

Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

GLESEC

GLESEC

GLESEC offer a complete range of Cyber Security services from Operations & Intelligence Services to Auditing & Compliance and Simulation and Training.

CyberCube

CyberCube

CyberCube provide world-leading cyber risk analytics for the cyber insurance market.

NodeSource

NodeSource

NodeSource helps organizations run production-ready Node.js applications with greater visibility into resource usage and enhanced awareness around application performance and security.

ADGS

ADGS

ADGS is a deeptech company focused in the fields of Agent-Based simulations (Emergent Behavior), Cybersecurity and Biometrics, Social Dynamics, Natural Language Processing and Artificial Intelligence.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

Cymptom

Cymptom

At Cymptom our purpose is to enable security managers to see at a glance all urgently risky gaps  in their organizations’ security posture at any given moment.

Bright Pixel Capital

Bright Pixel Capital

Bright Pixel Capital is a venture capital company with a focus on Cybersecurity, Retail Technologies, Digital Infrastructure and Emerging Technologies.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

CyFox

CyFox

CYFOX is at the forefront of cybersecurity innovation, specializing in providing cutting-edge AI-driven solutions tailored for any businesses.

Potech

Potech

Potech provides masterful services in Information & Technology and Cybersecurity to multiple markets across the world.