News

2024-04-22

Important Differences Between Different Types Of Artificial Intelligence [extract]

AI researchers are rapidly developing expert systems for solving a wide range of complex problems, using different techniques & methodology.

2024-06-13

Protecting Data In The Remote Working Era [extract]

Long Term Trend: Regular training & guidance will ensure that remote workers are equipped to do everything they can to keep company data safe.

2024-06-28

Russia’s Nation-State Hackers: A Serious Threat To Global Security [extract]

Russian hacking grabbed attention as a potential threat to free elections, national security, water systems, and even social stability.

2024-06-14

Elections 2024 - Fake News & Misinformation [extract]

Preserving The Integrity Of The Vote: The ready availability of AI text and image generators has greatly increased the threat to democracy.

2022-12-28

Cyber Security Awareness Training For Management & Employees [extract]

What You Can Do Right Now: Businesses are facing unprecedented economic pressures - a cyber attack is the last thing any organization wants.

2024-07-15

A Brief History Of Cyber Crime [extract]

With advances in technology inevitably come heightened risks with cybercrime, which has exploded to become the most active form of crime globally.

2024-08-06

Building Resilience In A Changing Cyber Threat Landscape

Minimising Attacks: Businesses need to arm themselves with AI-enabled defences that are stronger than AI-enabled threats. By Duncan Bradley

2024-08-04

Millions Of US Voters Exposed Online

The exposed databases contained documents with lists of 4.6m available or active voters, absentees, early mail-in voting records & duplicate voters. 

2024-08-05

The Paris Olympics: More Than Just Gold Medals Are At Stake

Liberty, Equality, Security: The Games are a major target for cyber criminals, who see an opportunity to cause major disruption. By Steve Bradford

2024-08-05

Russian Cyberwar Methods Are Evolving

Russia's changing priorities may be an indication that cyber weapons are becoming a more effective alternative to their conventional weapons.

2024-08-05

Cyber Crime Hothouses In Myanmar

Slave Labour: Online fraud in Southeast Asia is continuing to grow, with organised crime syndicates generating an estimated $64 billion annually.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

Stratogent

Stratogent

Stratogent does IT and Cybersecurity operations. We specialize in high-touch and high-change IT environments, especially in the biotech and pharma industry verticals.

Andrisoft

Andrisoft

Andrisoft develops WANGUARD, an anti-DDoS Software solution that monitors IP traffic using packet-based and flow-based Sensors, and protects networks

Infiltrate

Infiltrate

INFILTRATE is a deep technical conference that focuses entirely on offensive security issues.

Infosec Partners

Infosec Partners

Whether you’re looking for complete managed security or an on-call expert advisor, we offer a range of managed security services to complement your internal team or primary outsource partner.

Russell Reynolds Associates

Russell Reynolds Associates

Russell Reynolds Associates is a global leadership advisory and search firm with functional expertise in Digital Leadership, Data & Analytics, and Compliance.

AEWIN Technologies

AEWIN Technologies

AEWIN is professional in the fields of Network Appliance, Cyber Security, Server, Edge Computing and an ODM/OEM expert.

Char49

Char49

Char49 specialize in Penetration Testing, Red Team Assessment, Social Engineering and Security Research.

Rede Nacional CSIRT

Rede Nacional CSIRT

Rede Nacional CSIRT is a national network of CSIRTs in Portugal aimed at cooperation and mutual assistance in the handling of incidents and in the sharing of good security practices.

Kordia

Kordia

Kordia is a leading provider of mission-critical technology solutions throughout Australasia. We have the most comprehensive cyber security offering in New Zealand.

Emtec

Emtec

Emtec’s cyber security team provides advisory, assessment, & managed security services that help you build the cyber security policies, toolsets & best practices to elevate your cyber security posture

Jera IT

Jera IT

Jera IT provide fully managed IT support, cybersecurity services, telecoms systems, and IT strategy consultancy to businesses based in Aberdeen and the surrounding area.

Internet Initiative Japan (IIJ)

Internet Initiative Japan (IIJ)

IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers.

Tamnoon

Tamnoon

Tamnoon is the Managed Cloud Detection and Response platform that helps you turn CNAPP and CSPM alerts into action and fortify your cloud security posture.

Boo Consulting

Boo Consulting

Boo Consulting is a trusted privacy and risk consultancy firm. We are driven to help you find an appropriate solution that will suit your budget and requirements.