News

2023-11-28

Spy Agencies Are Hiring Via LinkedIn

Chinese espionage agencies are using fake LinkedIn accounts to try to recruit US citizens with access to government & commercial secrets.

2023-11-28

Cyber Security Executive Confesses To Hacking Hospitals

Business Development - The Wrong Way: C-Level executive pleads guilty to hacking & leaking patient data in a failed attempt to generate sales.

2023-11-27

Cyber Attacks On Israel Expand

SysJoker: A new version of a sophisticated cross-platform malware that can be installed & stay undetected before delivering malicious payloads.

2023-11-27

Creating A Top-Notch Financial App With Advanced Cybersecurity

The Ultimate Guide: What is the current role of cybersecurity in FinTech and what standards are better to opt for? By Serge Khmelovskyi

2023-11-27

Securing National Communications Infrastructure

Digital Connections: Network disaggregation is vital to protecting critical telecoms infrastructure against external threats. By Richard Brandon

2023-11-24

Intelligent Automation & AI Can Improve Business Resilience

Combined with human intelligence, AI can improve business resilience and a failure to invest risks business efficiency & reputation. By Scott Dodds

2023-11-24

HSBC Mobile Banking App Fails

Black Friday Blues: Millions of UK users of HSBC & First Direct mobile apps were unable to access banking services this morning as they went offline.

2023-11-23

What Is Cyber Hygiene & Why Is It Important?

Too many organisations are failing to practice good cyber hygiene. Companies must adapt & take steps to mitigate risk. By Rigo Van den Broeck

2023-11-24

Russian Hackers Have New Tools

LitterDrifter: Gamaredon's new malware demonstrates the innovative tools & tactics it has developed in campaigns against targets in Ukraine.

2023-11-21

British Library Confirms Ransomware Attack

20 Bitcoin Demanded: Britain's most important library confirms a ransomware attack that will take it weeks or possibly months to recover from.

2023-11-25

FBI & CISA Advisory - Dealing With Ransom Attacks

Scattered Spider: The major US cyber security agencies have released new data on ransomware exploits and their recommended mitigations.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Hitachi ID Systems

Hitachi ID Systems

Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management and password management solutions.

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

AET Europe

AET Europe

AET Europe is specialised in creating technological solutions for user identification and authentication.

DNV

DNV

DNV are the independent expert in assurance and risk management. We deliver world-renowned testing, certification and technical advisory services.

ISARA Corp

ISARA Corp

ISARA Corporation is a security solutions company specializing in creating class-defining quantum-safe cryptography for today's computing ecosystems.

achelos

achelos

achelos is an independent software development company providing innovative technical solutions for micro-processor chips / security chips and embedded systems in security-critical application fields.

European Society of Criminology (ESC)

European Society of Criminology (ESC)

The ESC Working Group on Cybercrime is focused on cybercrime, its causes and offenders, impact on victims, and our response to it at the individual, corporate, and governmental levels.

Naoris Protocol

Naoris Protocol

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

ITsMine

ITsMine

ITsMine’s Beyond DLP solution is a leading Data Loss Prevention solution used by organizations to protect against internal and external threats automatically.

Enzen

Enzen

Enzen is a global knowledge practice that provides consulting, technology, engineering, operating and innovation services to the energy and utility sectors.

Tailscale

Tailscale

Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly.

Anatomy IT

Anatomy IT

Anatomy IT empowers healthcare providers to deliver exceptional patient care with cutting-edge technology and cybersecurity solutions.

Eficens Systems

Eficens Systems

Eficens Systems is a global IT services and consulting company. We specialize in empowering businesses to harness the potential of Information Technology as a strategic asset.

2021.AI

2021.AI

2021.AI serves the growing business need for full oversight and management of applied AI.

Blue Cloud Softech Solutions

Blue Cloud Softech Solutions

Blue Cloud Softech propels inspiring digital transformations. We provide AI products, cybersecurity, healthcare technology, and cloud solutions.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.