News

2024-06-07

New Cyber Security Rules For Maritime Shipping

Impractical: Proposed rules to improve the resilience of US commercial shipping have attracted widespread criticism from the maritime industry.

2024-06-07

Donald Trump & Social Media

Ex-President Trump Rejoins TikTok: Despite his earlier intention to ban it while in office, candidate Trump has quickly attracted 3.6m followers.

2024-06-06

The Cyber Security Threat From Iran

Iran’s cyber operations are not limited to state infrastructure - they include harassment campaigns and attempts to intimidate individuals.  

2024-06-07

Fake News & Disinformation In Poland  

Destabilising European Elections: A fake news story saying Poles would be mobilized to fight in Ukraine was planted on a national news agency.

2024-06-07

Securing The Supply Chain

You're Only As Strong As Your Weakest Link: Resisting threats in your supply chain is a crucial part of protecting your business. By Tom Major

2024-06-06

The Cybersecurity Risks Of Generative AI

GenAI security risks are revealing themselves as multi-faceted threats that stem from how different users interact with the tools. By Jaimen Hoopes

2024-06-05

Hackers Target Healthcare

Serious breaches have very dangerous implications for the healthcare industry, sharpening the focus on how to protect medical data.

2024-06-06

London Hospitals Held To Ransom

Update: Seven London NHS hospital trusts have cancelled non-emergency operations and blood tests following a ransom attack by Qilin hackers. 

2024-06-04

You’ve Got Mail

Why Secure & Responsible Email Is Key to Safeguarding Our Data: The consequences of misusing it can be severe. By Anita Mavridis

2024-06-04

Identities Are The Highest Priority Risk Area

Focus On Identity Management: Senior security leaders’ support for Zero Trust is increasing, but skills and budgets aren’t keeping pace.

2024-06-03

Increasing Software Cyber Resilience

A new ‘Code of Practice for Software Vendors’ will ensure that security is fundamental to developing and distributing products and services. 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

Astra Security

Astra Security

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

FixMeStick

FixMeStick

FixMeStick is a virus removal device, a USB key that removes malware conventional antivirus software often can’t detect.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

Kingsley Napley

Kingsley Napley

Cyber crime is an area of growing legal complexity. Our team of cyber crime lawyers have vast experience of the law in this area.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

Adit Ventures

Adit Ventures

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT.

Saepio Solutions

Saepio Solutions

Saepio promote an all-encompassing approach to cybersecurity, ensuring the appropriate balance of budget and resource across Policy, Product and People.

Varen Technologies

Varen Technologies

Varen Technologies is an innovative consulting partner with highly respected cyber security, analytics, Agile Software Development and IT/maintenance expertise.

Avalor

Avalor

Avalor are on a mission to help security teams make faster, more accurate decisions by making sense of their data. With Avalor you can bring in data from anywhere, normalize it and analyze it.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

Oxford Information Labs (OXIL)

Oxford Information Labs (OXIL)

Oxford Information Labs brings together world-class software programmers and policy experts to provide a unique mix of expertise and hands on technical solutions.

Security Solutions Services (S-3)

Security Solutions Services (S-3)

S-3 specialize in crafting tailored network design, security hardware, software, and storage solutions for businesses of all sizes.

PureID

PureID

Protect your enterprise with PureAUTH #IAMFirewall, Resilient SSO platform, purpose built to provide Passwordless Authentication & Zero Trust Access, by default.

Operational Systems (OpSys)

Operational Systems (OpSys)

OpSys is a leading Managed IT and Cyber Security provider protecting the critical elements of businesses across the globe.

Surf Security

Surf Security

SURF Security has transformed the browser into your strongest security asset while providing complete end-user privacy – all with full compliance.