News

2024-11-20

Dealing With Cloud Security Challenges [extract]

The traditional security model, with a network firewall & on-premises network credentials, cannot address the security issues with cloud computing.

2024-11-22

Cyber Monday Is Not The Same As Black Friday

New Tradition: Cyber Monday, as the name suggests, historically only takes place online, while Black Friday sees deals both online and in-store.

2024-11-19

Undersea Communications Cables Cut

Internet cables between Germany and Finland, and Lithuania and Sweden suffered a sudden outage. The affected countries suspect sabotage.

2024-11-19

Musk Sues Microsoft Over OpenAI

Elon Musk is expanding his lawsuit against ChatGPT, charging that OpenAI, along with Microsoft, have violated antitrust law by stifling competitors.

2024-11-15

Imminent Zero-Day Attacks

CISA & NCSC alert warns of an increase in cyber attackers exploiting previously unknown vulnerabilities to compromise enterprise networks.

2024-11-18

Managing API Sprawl: The Growing Risk Of Shadow APIs & How To Mitigate It

Improve your API governance posture and eliminate API security blind spots with a deeply integrated service catalogue. By Miko Bautista

2024-11-18

Virtual iPhones: A Game Changer For Mobile App Development Security

Digital Twin: Virtual iPhones that allow developers to test & tweak their apps without needing a physical device are a security game-changer.

2024-11-15

USB Attacks: The Threat Putting Critical Infrastructure At Risk

Insights into the challenges organisations face in securing removable media, along with practical advice for enhancing its security. By James Neilson

2024-11-15

Hacker Sentenced For Bitcoin Theft

Razzlekhan: The husband of flamboyant Hip-Hop artist sentenced to 5 years in jail for theft and money laundering of Bitcoin currently worth $9billion.

2025-01-07

The Leading Indian Cyber Security Companies

India's top cyber security companies have a growing International profile and now operate at the forefront of the rapidly evolving threat landscape.

2024-11-19

Dealing With Cloud Security Challenges

The traditional security model, with a network firewall & on-premises network credentials, cannot address the security issues with cloud computing.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

IntSights

IntSights

IntSights is an intelligence driven security provider offering rapid, accurate cyberthreat intelligence and incident mitigation in real time

NetGuardians

NetGuardians

NetGuardians is a leading Fintech company recognized for its unique approach to fraud and risk assurance solutions.

Riscure

Riscure

Riscure is a global test lab and tools leader for device security. Core expertise in side channel analysis, fault injection and embedded device software.

Science Applications International Corporation (SAIC)

Science Applications International Corporation (SAIC)

SAIC is a premier technology integrator in the technical, engineering, intelligence, and enterprise information technology markets. Services and solutions include Cybersecurity.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

SenseOn

SenseOn

SenseOn’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

Antigen Security

Antigen Security

Antigen Security is a Digital Forensics, Incident Response and Recovery Engineering firm helping businesses and service providers prepare for, respond to, and recover from cyber threats.

U2opia Technology

U2opia Technology

U2opia is a consortium with a proven track record of delivering groundbreaking technology, cybersecurity, and innovative business solutions.

SignMyCode

SignMyCode

SignMyCode is a one-stop shop for trusted and authentic code signing solutions to safeguard software.

Cytidel

Cytidel

Cytidel is a vulnerability and risk management platform that utilises threat and business intelligence to help IT Security teams.

Knostic

Knostic

Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).

ITRM

ITRM

ITRM are one of the UK’s top managed service providers and offer a range of award-winning IT solutions, from ad-hoc consultancy to cyber security.

DACTA Global

DACTA Global

DACTA was established with the aim of simplifying the perception of complexity surrounding digital security challenges and solutions.