News

2023-08-30

He's Back Again...

Trump Breaks Silence On X (Twitter): Following suspension, Trump's return post received more than 36 million views and 530,000 likes.

2023-08-29

Reimagining Your Cyber Infrastructure

From Security To Resiliency: Organisations should focus on reducing the chances of a breach by reducing their attack surface. By Duncan Bradley

2023-08-29

Undetected Attackers Could Be Inside Your IT Systems Now

The starting point for cyber criminals is to find a way into a target’s network - in the majority of cases that begins by exploiting a human error.

2023-08-29

NIS2 Regulations Are Coming – Are You Ready?

EU Network & Information Security Rules: Tighter rules and tougher sanctions will apply to more organisations than before. By Graham Hawkey

2023-08-28

British Police On High Alert After Supply Chain Breach

London's Metropolitan Police issue a serious alert as cyber criminals breach an IT supplier responsible for ID cards and restricted access passes.

2023-08-24

AI Is The Next Big Thing For Browser Security  

A New Class Of Automated Attacks: As the access point for most online services, the browser is a pivotal point for cyber attacks. By Brett Raybould

2023-08-23

Identifying & Analysing Emerging Cloud Threats

The sheer speed and scope of the cloud native environment demands smarter decisions when prioritising limited resources. By Nurit Bielorai

2023-08-23

Major Sporting Events Are Open Targets

The State Of Play: Microsoft and the NCSC identify major sporting events, organisations and venues as increasingly vulnerable to cyber attack.

2023-09-04

Generative AI Could Replace The Internet

Transformational Technology: Generative AI is quickly becoming much more sophisticated and is poised to unleash the next wave of productivity.

2023-08-29

Cyber Security Firm Dragos Targeted By Hackers

An unsuccessful attempt to extort one cyber security firm involved not merely a risk to data security, but a very personal threat to the CEO's family.

2023-08-29

Understanding Generative AI

The potential of Generative AI to revolutionise content creation makes it important to understand what is, how it’s being used and by whom.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Quality Professionals (Q-Pros)

Quality Professionals (Q-Pros)

QPros are a recognized leader in providing full-cycle software quality assurance and application testing services.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

ZyberSafe

ZyberSafe

ZyberSafe is an innovative Danish company specialized within building hardware encryption solutions.

Cybersecurity Tech Accord

Cybersecurity Tech Accord

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies.

Zen360Consult

Zen360Consult

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

Objectives of the ISA Global Cybersecurity Alliance include the acceleration and expansion of standards, certification, education programs, advocacy efforts, and thought leadership.

Camel Secure - ZeroRisk

Camel Secure - ZeroRisk

Camel Secure is a company specialized in the development of products for information security and technology risk management.

Safetech Innovations

Safetech Innovations

Safetech Innovations is a team of cyber security experts, always at your service. We use human and cyber intelligence to help your business in uncertain times.

ImmuniWeb

ImmuniWeb

We Simplify, Accelerate and Reduce Costs of Security Testing, Protection and Compliance.

Metallic.io

Metallic.io

Metallic (formerly TrapX) is a SaaS portfolio for enterprise-grade backup and recovery, designed to protect your data from corruption, deletion, ransomware, and other threats.

Dropzone AI

Dropzone AI

Dropzone AI are creating a generational leap in SecOps by using AI to automate cyber expertise and tooling.

Token Security

Token Security

Token is the new approach designed for the identity boom era. Introducing Machine-First Identity Security.

PDI Technologies

PDI Technologies

PDI Technologies helps convenience retail and petroleum wholesale businesses around the globe increase efficiency and profitability by securely connecting their data and operations.

Rebellion Defense

Rebellion Defense

Rebellion Defense is a technology company developing advanced software to ensure mission-critical organizations stay ahead of emerging threats.

Endari

Endari

Endari specializes in building cybersecurity maturity within the operational DNA of early-stage startups and SMBs.

Novera

Novera

Novera offer security assessment and advisory services to help businesses manage risks from AI, cyber and privacy.

Parried

Parried

Parried is a leading Managed IT Services and Cybersecurity provider, known for blending deep technical knowledge with business strategy.