News

2024-09-11

NIS2 - Countdown To Compliance

How CISOs Can Lead The Charge: Immediate actions CISOs must take to ensure their organisations fully comply with NIS2. By Andrew Lintell

2024-09-11

Quantum-Safe Encryption Comes Closer

Quantum Computing Wil Overturn Public-Key Cryptography: NIST has new cryptographic algorithms that can withstand quantum computer power.

2024-09-10

The Obstacles That Security Teams Face In Vulnerability Management

The Big Five: To stay ahead of adversaries, teams must use advanced technologies and prioritise the most critical vulnerabilities. By Sylvain Cortes

2024-09-10

Google's $200 Billion AdTech Business Has A Monopoly Challenge

Google has lost one major case concerning its dominance in Online Search. Now, it faces a second lawsuit challenging its dominace in AdTech.

2024-09-10

Social Media, Misinformation & The US Elections

Generative AI plus a reliance on social media & other online news sources are making it hard for voters to know what's real and what's not.

2024-09-09

Criminally Exploiting AI Tools To Generate Illicit Revenue From Music Streaming

The accused claimed more than $10m in music royalty payments using AI tools and a network of bots, in a highly sophisticated long-term fraud.

2024-09-09

Telegram Disables Features Used For Illegal Activity

Telegram has moved fast to change some key features of its messaging platform, affecting 950m users, following the arrest of CEO Pavel Durov.

2024-09-06

How AI Will Help Disrupt Elections Around The Globe

Generative AI is an attractive option for politically driven and nation state-sponsored threat actors. What can stop them? By Craig Watt

2024-09-09

Cyber Attack Hits German Air Traffic Control

The German air traffic control agency was hit by a cyber attack disrupting its office communications and Russian military hackers are suspected.

2024-09-09

Iranian Campaign Targets WhatsApp Users

Meta has disclosed a cyber security issue involving Iranian threat actors targeting WhatsApp users across multiple countries, including Israel.

2024-09-07

Hackers Attack Russia & Belarus

Head Mare: A hacktivist group carrying out cyber attacks targeting organisations located in Russia and Belarus using ransomware tools & tactics.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

RIVA Solutions

RIVA Solutions

RIVA provides innovative best practices in IT and management consulting, program support services and emerging technologies.

BruCON

BruCON

Brucon is Belgiums premium security and hacking conference.

Continuity Shop

Continuity Shop

Continuity Shop provides training and consultancy in Business Continuity and Information Security to some of the world's biggest organisations.

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

Inspired eLearning

Inspired eLearning

Inspired eLearning deliver solutions that help clients nurture and enhance workforce skills, protect themselves against cyberattacks and regulatory violations.

Sepior

Sepior

Our vision is to make Sepior the leading provider of cloud-encryption software in the world.

CyberWarrior

CyberWarrior

CyberWarrior deliver training and consulting for some of the world’s top brands and also partner with national systems integrators to augment their teams with our expertise.

Cynamics

Cynamics

Cynamics is the only network monitoring solution built specifically for Smart City, Public Safety and Critical Infrastructure networks.

CYDES

CYDES

CYDES is the first event in Malaysia to showcase advanced solutions and technologies to address cyber defence and cyber security challenges for the public and private sectors.

Blackpoint Cyber

Blackpoint Cyber

Blackpoint’s mission is to provide effective, affordable real-time threat detection and response to organizations of all sizes around the world.

Cado Security

Cado Security

Cado Security is pushing digital forensics, and cyber incident response to the next level with an incident response software platform and specialist consulting services.

Fullstack Academy

Fullstack Academy

A trailblazer in bootcamp education, Fullstack Academy prepares students for fulfilling careers in tech through our NYC campus, online learning, and university partnerships.

Vancord

Vancord

Vancord is an information and security technology company that works in collaboration with clients to support their infrastructure and data security needs for today and tomorrow.

Zeta Sky

Zeta Sky

Zeta Sky offers a full range of IT and cyber-security services for your business.

Iron EagleX

Iron EagleX

Iron EagleX deliver engineering solutions in cloud computing, big data, cyber, and machine learning technologies to US Government customers.