News

2021-05-06

Top Five Most Common Gaps In Businesses’ Cyber Security

Embedding cyber security into your operations takes everyone in the organisation to understand and accept their responsibility. By Victor Lough

2021-05-05

Your Organisation Needs A Cyber Audit

Cyber threats evolve at breakneck speed and it’s important to continually ensure that your cyber security measures are effective and up to date.

2021-05-05

The Cyber Security Paradigm Is Changing

Traditional cyber security, with hard external boundaries, is being undermined by pressure for more operational flexibility and developments in IT.

2021-05-04

Managing Cyber Security As Office Work Resumes

Cyber security and compliance teams must begin the return-to-office planning process so that when employees arrive, everyone is prepared.

2021-05-04

Dark Web Drug Dealers Jailed

Two drug dealers who made $4.8 million from their dark web drugs operation got so many clients that they used an automated “bot” to run the business.

2021-05-04

World Password Day - 6th May

World Password Day exists to spread the awareness that taking care of your passwords is vital to protecting yourself against identity theft.

2021-05-04

Risks Of Bias In ‘Emotional AI’

Facial recognition mass surveillance software used to scan crowds to detect doubt and anger as emotions that indicate potential threats, is not safe.

2021-04-30

Hackers Threaten To Publish Police Informant Data

Washington DC police is "aware of unauthorised access on our server" and has received a ransom demand threatening to name their informants.

2021-05-03

Facebook And Apple Clash

A new feature is being introduced to iPhones and iPads which is causing a serious disagreement between Apple and Facebook over user privacy.

2021-05-02

Darktrace Share Price Jumps

In an exceptional example of a female-led technology company going public, Darktrace has achieved a valuation in excess of £2 billion.

2021-04-30

Is Ethical Hacking A Business Necessity In 2021?

Businesses want to improve their cybersecurity - training, stronger systems & software. But how about using ethical hackers? By Chester Avey

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

AtkinsRéalis

AtkinsRéalis

AtkinsRealis is a market-leading design, engineering and project management consultancy operating in fields ranging from infrastructure, through energy and transport to cybersecurity.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

MyCERT

MyCERT

MyCERT is the National Computer Emergency Response Team of Malaysia.

Verimuchme

Verimuchme

Verimuchme is a digital wallet and exchange platform to secure, verify and re-use personal information.

Digital Ship

Digital Ship

Digital Ship provides news, information, conferences and events focused on digital ship systems, information technology and security relating to maritime operations.

Temasoft

Temasoft

TEMASOFT is a software company focused on developing security and infrastructure products.

Thrive

Thrive

Thrive delivers the experience, resources, and expertise needed to create a comprehensive cyber security plan that covers your vital data, SaaS applications, end users, and critical infrastructure.

Blue Cedar

Blue Cedar

Blue Cedar's mobile app security integration platform secures and accelerates mobile app deployment for enterprises and government organizations around the world.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Centre for Cyber Security Belgium (CCB)

Centre for Cyber Security Belgium (CCB)

The Centre for Cyber Security Belgium is the central authority for cyber security in Belgium.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

Green Enterprise Solutions

Green Enterprise Solutions

Green Enterprise Solutions are a Namibian company providing Information and Communication Technology (ICT) services to corporate Namibia.

Yotta Infrastructure Solutions

Yotta Infrastructure Solutions

Yotta Infrastructure, a Hiranandani group company, provide Datacenter Colocation and Tech Services such as Cloud services, Network & Connectivity, IT Security and IT Management services.

Triangle

Triangle

Triangle enable innovative business transformation by ensuring critical hybrid infrastructures are optimised, interoperable and secure.

Protos Labs

Protos Labs

Protos Labs enables insurers & enterprises to make better cyber risk decisions through holistic, real-time risk management tools.

eGyanamTech (EGT)

eGyanamTech (EGT)

eGyanamTech provides robust security solutions tailored for Operational Technology (OT) and Supervisory Control and Data Acquisition (SCADA) systems used in critical infrastructure systems.