News

2023-07-22

Russian Hackers Hit Ukrainian Security Services

Active & Dangerous Threat: Russian state-sponsored hackers named Gamaredon have attacked thousands of Ukraine government computers.

2023-07-21

Cybersecurity Threats To Digital Banking & How to Mitigate Them

Digital banking offers great convenience - it also exposes users to cybersecurity threats. Together, banks & customers can mitigate these threats.

2023-08-07

What’s The Problem With Open-Source Software & Cybersecurity?

There is an illusion of trust around open-source software and its code, which leads to the potential for unique cybersecurity vulnerabilities.

2023-08-09

Getting Your First Cyber Security Job 

Cyber Skills Shortage: For those interested in a career in cyber security, there are many opportunities to enter this vast and interesting field. 

2023-08-04

Generative AI Tools Help Criminals Launch More Sophisticated Attacks

WormGPT: Even attackers with limited skills can use this technology, making it an accessible tool for a broader spectrum of cyber criminals.

2023-08-08

A Database Tracking Maritime Cyber Attacks

The incidents in the database demonstrate the relevance of cyber security to the modern maritime industry and the major vulnerabilities that exist.

2023-08-01

Have We Become Complacent About The ‘Insider Threat’?

Time Bomb: Human beings will always make mistakes, let their guard down, and behave in ways that leave company data exposed. By Jon Fielding

2023-07-31

British University Data Breaches Are A Lesson For All

The potential reach and impact of a breach is serious, placing personal information at risk and disrupting millions of UK students. By Stuart Jubb

2023-07-27

Protecting Your Home Devices Against Attack

Not maintaining the appropriate security measures for your smart devices, their apps & your Wi-Fi network could cause you a lot of trouble.

2023-07-14

WEBINAR | Uplevel Your Cloud Security Posture With CSPM

WEBINAR | JULY 27: Navigating cloud security: The importance of Cloud Security Posture Management tools.

2023-07-26

Setting Up An Operational Resilience Framework

In the face of a destructive cyberattack enterprises must plan to mitigate the impact based on pre-established objectives. By Bill Nelson

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Indium Software

Indium Software

Indium Software is an Independent Software Testing Company offering software testing services (including security testing) and offshore Quality Assurance solutions.

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

Arc4dia Labs

Arc4dia Labs

Arc4dia have developed SNOW, a cyber security solution to combat the world’s most sophisticated cyber threats.

Garner Products

Garner Products

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination.

Estio Training

Estio Training

Estio Training is a specialist digital and IT apprenticeships provider, dedicated to introducing new skills and developing existing talent in businesses across the UK.

CHEQ

CHEQ

CHEQ provides fully autonomous, preemptive technology for brand safety and ad-fraud prevention.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

Cyber Security Services

Cyber Security Services

Cyber Security Services is a cyber security consulting firm and security operations center (SOC).

ServerScan

ServerScan

ServerScan specializes in providing server scanning & compliance services to organizations of all types and sizes.

Searchlight Cyber

Searchlight Cyber

Searchlight Cyber is a leading darknet intelligence company. Working with law enforcement, industry, and end users to help protect society against the threats of the darknet.

Abertay cyberQuarter

Abertay cyberQuarter

The Abertay cyberQuarter is a cybersecurity research and development centre housed within Abertay University.

ZINAD IT

ZINAD IT

ZINAD is an information security company offering state-of-the-art cybersecurity awareness products, solutions and services.

HiSolutions

HiSolutions

HiSolutions is a renowned consulting firms for IT governance, risk & compliance in Germany, combining highly specialized know-how in the field with profound process competence.

AdviserCyber

AdviserCyber

AdviserCyber provide Cybersecurity and Compliance Solutions for Registered Investment Advisers.