News

2024-08-27

PDF Merging Guide: Simplify Document Management

PDF merging enhances document workflows and organization for business and personal use, with practical steps for combining files efficiently.

2024-08-30

Understanding Social Engineering Attack Methods 

Social Engineering Targets Human Vulnerabilities: Deceiving unsuspecting users into dropping their security & giving up sensitive information.

2024-08-28

For Many Businesses Experiencing MultiCloud Data Breach, Multi-Cloud Security Could Be The Answer

There are common challenges associated with securing multi-cloud environments and multi-cloud security can help prevent these breaches.

2024-08-29

The NIS2 Directive Will Impact The Security Ecosystem Across The EU

NIS2: Protecting networks and information systems through proactive measures and responding quickly when under a cyberattack. By Jos Beernink

2024-08-29

Mobile & On-Line Banking Cyber Security [extract]

Managing Your Money Online: Banks take your security seriously, but it's still important that you take steps to stay safe while banking online.

2024-08-29

Iranian Hackers Target Israeli Citizens

Hackers though to be connected to the government of Iran have stepped up phishing attacks targeting high-profile individuals in Israel.

2024-08-29

Mobile & On-Line Banking Cyber Security

Managing Your Money Online: Banks take your security seriously, but it's still important that you take steps to stay safe while banking online.

2024-08-28

Enhancing SaaS Security: Leveraging VPNs & ITDR to Combat Identity Theft:

Organizations can establish a strong barrier against the various dangers aimed at their networks by adopting ITDR and VPNs in their security plan.

2024-08-28

Hacker Kills Himself

Hacker Fakes His Death To Avoid Child Support: He became officially registered as a deceased person in many government databases.

2024-08-28

US Proposes New Cyber Security Standards For Aviation

Aircraft are increasingly designed to be connected to both internal & external data networks, rendering them more vulnerable to cyber threats.

2024-08-30

China Aims to Compete With OpenAI, Gemini & Grok

Update: OpenAI’s decision to ban their products in China is accelerating the rise of Chinese AI companies, in fierce competition with US platforms.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CNCERT/CC

CNCERT/CC

CNCERT is the national Computer Network Emergency Response Technical Team / Coordination Center of China.

BGD E-GOV CIRT

BGD E-GOV CIRT

BGD e-GOV CIRT's mission is to support government efforts to develop ICT programs by establishing incident management capabilities within Bangladesh.

Fortress Group

Fortress Group

Fortress is specialized in confidential and discrete recruitment solutions and temporary staffing in the field of security and risk management.

DNV

DNV

DNV are the independent expert in assurance and risk management. We deliver world-renowned testing, certification and technical advisory services.

Anect

Anect

Anect is a leading provider of ICT security and services for hybrid and cloud solutions.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

Tetra Defense

Tetra Defense

Tetra Defense is a leading incident response, cyber risk management and digital forensics firm.

6clicks

6clicks

6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards.

PCS Security (PCSS)

PCS Security (PCSS)

PCS Security provides secure, reliable and state-of-the-art security solutions to help our customers address their security concerns.

Digimune

Digimune

Digimune is an all-encompassing cloud-based cyber risk protection platform that guards you against the dangers of our digital world.

PROVINTELL Cyber Security

PROVINTELL Cyber Security

PROVINTELL is a Managed Security Service Provider (MSSP) specialising in Next-Gen Cyber Defense and Response to detect and respond to threats.

Pistachio

Pistachio

Pistachio is the new evolution of cybersecurity awareness training and attack simulations.

Barclay Simpson

Barclay Simpson

Barclay Simpson is proud to have a long history of delivering cyber security, technology and governance recruitment services.

Oxylabs

Oxylabs

Oxylabs is the largest datacenter proxy pool in the market, with over 2 million proxies. Designed for high-traffic, fast web data gathering while ensuring superior performance.

TeamT5

TeamT5

TeamT5 Inc. is a leading cybersecurity company dedicated to cyber threat research and solutions.

Hopper Security

Hopper Security

The Future of Open-Source Risk Management Starts Here. We built Hopper to make sure you can harness the power of Open-Source safely and effectively.