News

2024-10-14

A Landmark Ransom Attack On Healthcare

$2.3 Billion In Costs: What one of the worst attacks to ever hit the US healthcare industry can teach us about cybersecurity in 2024. By Claud Bilbao

2024-10-17

2024 US Presidential Election Cyber Intrusion: Part 3 - Hostile Nation State Actors

Complex nation state-level activity involving the deployment of intrusive attack vectors, influence campaigns & hybrid threats combining both.

2024-10-09

2024 US Presidential Election Cyber Intrusion: Part 2 - Covert Influence Operations

USA 2024 Elections: Hostile nation pose a serious foreign influence threat, sowing discord & division amongst US citizens.. By Craig Watt 

2024-09-26

A Critical Flaw Exposing Google Cloud Servers

CloudImposer: The flaw could potentially expose millions of servers operating on Google Cloud Platform to Remote Code Execution attacks. 

2024-10-04

Cyber Insurance: What Businesses Need To Know

A Crucial Safety Net Gets More Expensive: As ransomware incidents have surged, so too have the premiums for cyber insurance. By Greg Day

2024-10-11

Advances In Recognising Deepfakes

Detecting AI-generated content is becoming increasingly difficult. This has significant implications, like deciding if evidence is real or not.

2024-10-11

Surge In DDoS Attacks On Financial Services

Network Layers 3 & 4: Financial services continues to be the most frequently targeted industry with DDoS attacks for the second year running.

2024-10-10

Improving Cyber Security With AI

Turning Information Into Intelligence: AI becomes more intelligent the more it’s used, understanding a company’s unique environment.

2024-10-09

Conspiracy - Reducing Fake News & Disinformation

AI Chatbot Of Truth: Widespread belief in unsubstantiated conspiracy theories is a major source of public concern and a focus of scholarly research.

2024-10-09

Pakistan Joins The Top Tier Of Global Cybersecurity

Pakistan has moved up to join the Top 50 in the ITU Global Cyber Security Index, in major boost to international confidence in the national economy.

2024-09-24

Chinese Botnet Deployed To Infect Critical Infrastructure

Chinese threat groups are using rigged IoT devices to hack US and other organisations, presenting an increased threat to critical infrastructure.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Sopra Steria

Sopra Steria

Sopra Steria is a leading European information technology consultancy.

Atea

Atea

Atea is the market leader in IT infrastructure for businesses and public-sector organizations in Europe’s Nordic and Baltic regions.

Bangladesh Association of Software & Information Services (BASIS)

Bangladesh Association of Software & Information Services (BASIS)

BASIS is the national trade body for Software & IT Enabled Service industry of Bangladesh.

Digital Resolve

Digital Resolve

Digital Resolve delivers solutions that help companies maintain trust and confidence through proven and cost-effective fraud-protection and identity intelligence technology.

LuJam Cyber

LuJam Cyber

LuJam Cyber is a cybersecurity company that provides protection to SME Networks.

Desec Security

Desec Security

Desec's training platform allows professionals around of the world to acquire knowledge and practical experience in Information Security.

Global Incubator Network Austria (GIN Austria)

Global Incubator Network Austria (GIN Austria)

GIN Austria is the connecting link between Austrian and international startups, investors, incubators and accelerators with a focus on selected hotspots in Asia.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

Intelligent CloudCare

Intelligent CloudCare

Intelligent CloudCare, a division of IPS, is a full IT Services provider serving the needs of SMBs in the metropolitan New York City region.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

GO Business

GO Business

GO Business are a specialised B2B team within GO that caters to the communication needs of the local business community in Malta.

CyberMontana

CyberMontana

CyberMontana is a statewide initiative providing cybersecurity awareness, training, and workforce development for businesses and residents of Montana.

SecZone

SecZone

SecZone is a Chinese enterprise with a mission to "Make It Secure." We are dedicated to driving software security innovation globally.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.

XBOW

XBOW

XBOW brings AI to offensive security, augmenting the work of bug hunters and security researchers.