News

2023-08-01

Who Practices Digital Safety Better, Mac Or Windows Users?

Microsoft Vs. Apple: Despite ever-evolving changes in the cyber security landscape, many people still hold outdated ideas about digital safety.

2023-07-31

Cyber Crime Claims Repeat Victims

Over 80% Attacked More than Once: Cyber crime attacks are costly and some businesses are finding themselves being targeted multiple times.

2023-07-24

The Security Challenge: Mapping & Securing Your Distributed Data

Why mapping your distributed data is necessary, what challenges you’ll face along the way, and how you can overcome them. By Dotan Nahum

2023-07-25

The Impact of Artificial Intelligence On Knowledge Workers

The impact of Artificial Intelligence on jobs is still an abstract concept for most workers - something on the distant horizon. That's changing fast.

2023-07-24

Cyber War, Intelligence, Malware & Espionage

Digital disruption is sweeping through the world’s second-oldest profession, Spying, and it is altering all aspects of intelligence collection.

2023-07-26

British Employees Lack The Training To Use AI Tools

Research from Salesforce shows that skills shortages at organisations across the UK pose serious challenges for the uptake of AI tools. 

2023-07-20

Sweden Issues An Order 'Stop Using Google Analytics'

Four Companies Fined; Customers' personal data was supplied to Google Analytics in a way that failed to meet EU technical security standards.

2023-07-13

A Perfect Storm For Cybercrime

Geopolitical Instability & Economic Uncertainty: Agility and flexibility are key, as threat actors are always evolving. By Fabien Rech

2023-07-18

A Million British Medical Patient Records Hacked

Details potentially exposed include name & contact details, next of kin information, ID numbers, study details, ethnicity, and even disability codes.

2023-07-19

British Spy Agency Was Hacked 20 Years Ago

Two decades have passed since malware designed to evade detection & steal sensitive data was first detected on a British government device.

2023-07-17

SCADA Is Dead, Or Is It?

Advanced Manufacturing: The traditional automation pyramid has collapsed and the next generation of solutions has arrived. By Stefan Reuther

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Green Hills Software

Green Hills Software

Green Hills Software is the largest independent vendor of embedded secure software solutions for applications including the Internet of Things.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

AVG Technologies

AVG Technologies

AVG is focused on providing home and business computer users with the most comprehensive and proactive protection against computer security threats.

Genua

Genua

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation.

Datacom Systems

Datacom Systems

Datacom Systems is a leading manufacturer of network visibility solutions.

Cologix

Cologix

Cologix provides reliable, secure, scalable data center and interconnection solutions from 24 prime interconnection locations across 9 strategic North American edge markets.

Medigate

Medigate

Medigate is a dedicated medical device security platform protecting all of the connected medical devices on health care provider networks.

Think Cyber Security (ThinkCyber)

Think Cyber Security (ThinkCyber)

ThinkCyber is a Tel Aviv-based Israeli company with a team of cybersecurity professionals who are experts in both information and operations technology.

CryptoTec

CryptoTec

CryptoTec is a provider of security concepts and encryption solutions for secure communication between decentralized computerized systems.

Tech Mahindra

Tech Mahindra

Tech Mahindra is a global leader in IT solutions, BPO, business consulting services & digital technologies.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

Nexum

Nexum

Nexum takes a comprehensive approach to security, from detecting and preventing network threats, to equipping you with the information, tools and training you need to effectively manage IT risk.

Barrier Networks

Barrier Networks

Barrier Networks are a Cyber Security Managed Service Provider that specialises in Network and Application security.

C/side (cside)

C/side (cside)

At c/side, we're creating the ultimate delivery, performance and detection mechanism for browser-side fetched 3rd party Javascript.

Faddom

Faddom

Faddom is an agentless tool that visualizes your on-premises and cloud infrastructure, as well as their inter-dependencies.