News

2024-10-01

Six Steps On The Road To NIS2 Compliance

NIS2 is the EU’s stringent new cybersecurity Directive and member states have until 17th October to ratify it into national law. By Martin Davies

2024-09-17

Try These Virtual Private Network Alternatives Yourself Now 

Centralized VPNs are a valid solution for web security, although they have been known to leak user data. What are the alternative solutions?

2024-10-01

Cristiano Ronaldo Has A Billion Social Media Followers

The 1 billion figure comprises the total number of his followers on Instagram, Facebook, Twitter, YouTube plus the Chinese platforms Weibo & Kuaishou.

2024-10-01

Meta To Use Facebook & Instagram Posts To Develop AI Tools

Illegal In The EU: Meta is given conditional permission to use anonymized posts from British Facebook & Instagram users to train AI models.

2024-10-01

US Healthcare Provider Fails To Protect Customer Data

Fully 9 months after it was first detected has the extent of a breach, which exposed personal data of 400,000 customers, now been disclosed.

2024-09-22

EC-Council Unleashes AI-Powered Ethical Hackers On Cybercrime

EC-Council: CEH v13 certification equips cybersecurity professionals with essential AI skills & knowledge to prepare them for new era of cybercrime.

2024-10-02

Google’s EU Antitrust Case Dropped

Market Dominance: Google has won its challenge against a €1.49bn fine from the EU for blocking rival online search advertisers.

2024-10-02

Medusa Ransomware Group: Delivering Sophisticated Attacks

The Medusa cyber crime group has found a critical vulnerability in FortiClient EMS software to launch sophisticated ransomware attacks.

2024-10-02

Improving Threat Intelligence Sharing

The disconnect between teams & siloed use of security tools presents a significant risk to successful delivery of threat intelligence. By Dan Bridges

2024-09-23

Criminal Communication App Taken Down

Australian police have infiltrated Ghost, an encrypted global communications app developed for criminals, leading to dozens of arrests.

2024-09-26

AI-Powered Translation: A Bridge Between IT & Business

AI-powered translation can break down language barriers, particularly when it comes to translating complex technological jargon. By Paul Maksimovic 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BruCON

BruCON

Brucon is Belgiums premium security and hacking conference.

SecureWorks

SecureWorks

SecureWorks provides intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

International Association for Cryptologic Research (IACR)

International Association for Cryptologic Research (IACR)

(IACR is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.

Modux

Modux

Modux focus on a number of core competencies across cyber security including; cyber intelligence & analytics, penetration testing and training.

Me Learning

Me Learning

Me Learning provides engaging, informative and clearly explained learning materials for complex and challenging professional environments in areas including GDPR and Information Governance.

Cyber Craft

Cyber Craft

CyberCraft is an innovative and dynamic software development, outsourcing and consulting company. Services offered include penetration testing.

Metro Systems

Metro Systems

Metro Systems offer fully integrated IT solutions & services covering Digital Transformation, Digital Infrastructure, Cyber Security and Training.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

Transmit Security

Transmit Security

The Transmit Security Platform provides a solution for managing identity across applications while maintaining security and usability.

Lunio

Lunio

Lunio makes the internet a safer and more reliable place for everyone trying to grow their business by automatically getting rid of fake clicks, traffic, and leads on all ad platforms.

Cyber Readiness Institute (CRI)

Cyber Readiness Institute (CRI)

At the Cyber Readiness Institute, our mission is simple: empower small and medium-sized enterprises with free tools and resources to help them become more secure and resilient.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

Peris.ai

Peris.ai

Peris.ai is a cybersecurity as a service startup that protects businesses and organizations from online threats.

Hetz Ventures

Hetz Ventures

Hetz Ventures is a global-facing VC investing in highly talented and ambitious Israeli founders who operate at the cutting edge of deep technology.

Pvotal Technologies

Pvotal Technologies

Pvotal Technologies engineer complex, automated processes aligned with best AIOps, BizDevOps, DevSecOps, CloudOps, and ITOps practices.