News

2024-03-06

Russian Military Botnet Dismantled

The US Department of Justice has disrupted a botnet controlled by the Russia state-sponsored hackers, Forest Blizzard - aka Fancy Bear.

2024-03-08

Email Attacks Doubled In 2023

Cyber criminals are exploiting AI-enhanced techniques to create more convincing phishing scams, guaranteeing that this challenge will escalate.

2024-03-05

Cybercrime Hit 1.5m UK Businesses In 2023

More than 1.5 million UK businesses fell victim to some form of cybercrime last year, at a cost of more than £30.5 billion. London lost £7.1 billion.

2024-03-11

Deepfakes Complicate Election Security

Detection & Controlling Deepfakes: Leading US technology companies have agreed to combat the deceptive use of AI In the US Elections.

2024-03-01

Surge in “Hunter-Killer” Malware

Discovered: A threefold increase in the types of destructive malware designed to actively target defensive systems & capable of disabling them.

2024-02-23

Data Breach - Bank of America Warns Clients & Customers

Bank of America is notifying customers of a cyber attack affecting 57,000 of them that their personal information was stolen in a data breach.

2024-02-29

Nation State Hackers Deploy AI

Offensive Cyber Operations: Microsoft says it has detected threats from foreign countries that have been trying to exploit OpenAI's tools.

2024-02-28

US Navy Will Use Data Analytics For Maritime Security

Structured Data Sets: The US Navy is planning to use automation & data analytics to improve cyber defenses for its unclassified networks.

2024-02-22

A Goal Without A Plan Is Just A Wish

Incident Response: If your goal is a robust information security programme then you must have an Incident Response plan. By Chris Denbigh-White

2024-02-21

Managed Security Services In The Age of Advanced Threat Intelligence 

The goal of threat intelligence is to ensure organisations have the right tools to make better, faster & decisions based on timely, actionable data.

2024-02-20

Top Three Types of Data Security Technology

Encryption, Firewalls, Authentication & Access Control: The top three types of technology that strengthen security and protect against cyber threats.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NATO Communications and Information Agency (NCIA)

NATO Communications and Information Agency (NCIA)

The NCIA Cyber Security Service Line is responsible for planning and executing all life cycle management activities for cyber security.

File Centre

File Centre

File Centre is a leading specialist when it comes to data backup, we offer our clients a premium backup retrieval and delivery solution.

TechCERT

TechCERT

TechCERT is Sri Lanka’s first and largest Computer Emergency Readiness Team (CERT).

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

EPIC Insurance Brokers & Consultants

EPIC Insurance Brokers & Consultants

EPIC is an insuarnce broker and consultancy firm. Risk management services include risk consultancy and cybersecurity insurance.

Shift5

Shift5

Shift5 focus on securing operational technology (OT) by building best-in-class, dual-use products serving military and commercial entities.

RIA in a Box

RIA in a Box

MyRIACompliance combines our team of RIA compliance experts with an online software platform to help investment advisers better manage regulatory compliance and cybersecurity responsibilities.

SnapAttack

SnapAttack

SnapAttack is a collaborative platform that empowers your security team to stay ahead of threats, create robust behavioral analytics for your existing tools, and prove your program's effectiveness.

NARIS

NARIS

NARIS is the leading provider of an integrated Governance, Risk and Compliance platform called NARIS GRC.

TotalAV

TotalAV

TotalAV Antivirus is a free-to-use app packed with all the essential features to find and remove malware, keeping you safe.

Center for Information Security Awareness (CFISA)

Center for Information Security Awareness (CFISA)

CFISA was formed by a group of academics, security and fraud experts to explore ways to increase security awareness among audiences, including consumers, employees, businesses and law enforcement.

HTL Support

HTL Support

HTL Support, your trusted partner for comprehensive IT support in London. We specialize in delivering top-tier IT solutions tailored to both large enterprises and small businesses.

CASwell

CASwell

Caswell is an industry-leading OEM/ODM specializing in networking, security, SD-WAN, NFV, telecommunication and IoT applications.

AI EdgeLabs

AI EdgeLabs

AI EdgeLabs is a powerful and autonomous cybersecurity AI platform that helps security teams respond immediately to ongoing attacks and protect Edge/IoT infrastructures.

Aeris

Aeris

Aeris IoT Watchtower is the world’s first fully integrated cyber security solution for cellular IoT devices.

Holiseum

Holiseum

Holiseum delivers innovative cybersecurity solutions for the critical infrastructure organizations, as well as cybersecurity services and consulting.