News

2023-07-04

The Nuclear Governance Model Won’t Work For AI

AI is increasingly discussed as an existential threat on the same scale as nuclear weapons. This parallel distorts the conversation about regulation.

2023-07-03

The CIA Has A Social Media Campaign Just For Russians

The campaign includes a new CIA channel on Telegram - a widely used social media network that offers a source of unfiltered news in Russia.

2023-07-03

Canada Might Lose Its Dispute With Google

Costly News Links: Google and Meta, the owner of Facebook and Instagram are saying they will block local news from their platforms in Canada.

2023-07-03

Thousands Of WordPress Sites Exposed 

Ultimate Member Plugin: Over 200,000 WordPress sites have a newly found security defect, leaving them dangerously exposed to hackers.

2023-07-03

The Seven Stages Of Cyber Resilience:

The Emotional Roller Coaster Of Data Protection: For small & medium businesses, data resilience is a critical necessity. By Richard Massey

2023-07-03

How To Back Up GitLab To Prevent Data Loss 

GitLab Backup Methods: Streamlining backup processes, ensure data reliability & let DevOps focus on their core development tasks.

2023-06-29

Today’s CISO: How The Role Has Evolved

A Transformational Role: CISOs are integral to fundamental business decisions and are now entitled to a seat at the boardroom table. By Frank Kim

2023-06-28

Browser-Based Social Engineering Trends

Watchguard's latest report shows three of the four new malware threats originated in China and Russia with living-off-the-land attacks on the rise.

2023-06-28

Phishing – It’s Not About Malware (Or Even Email)

Phishing Is No Longer About Infecting Your Computer: Experts at SANS have analysed the latest trends and key indicators. By Lance Spitzner

2023-06-27

Innovation In Cyber Security: NDR Meets XDR

Network Detection and Response and Extended Detection and Response have a synergy that leads to stronger cyber defenses.

2023-06-26

How Does Your Board Measure Cyber Resilience?

Adopting A Prevention-First Approach: Going beyond traditional cybersecurity measures means prioritising resilience. By Deryck Mitchelson

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

GSMA - IoT Security Guidelines

GSMA - IoT Security Guidelines

GSMA has created a set of security guidelines for the benefit of service providers who are looking to develop new IoT products and services.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

Synack

Synack

Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners.

Awake Security

Awake Security

Awake Security offer a security solution built on an AI platform that acts like the human brain to sense, detect, and respond to threats you may not even know exist.

Salt Security

Salt Security

Salt Security protects the APIs that are the core of every SaaS, web, mobile, microservices and IoT application.

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

DAkkS

DAkkS

DAkkS is the national accreditation body for Germany. The directory of members provides details of organisations offering certification services for ISO 27001.

bluedog Security Monitoring

bluedog Security Monitoring

Sentinel from bluedog provides powerful and affordable internal network monitoring.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Netstar

Netstar

Netstar is an IT Support company based in Central London providing fully managed IT Support, Cyber Security and Technology Consulting services.

Kyndryl

Kyndryl

Kyndryl has a comprehensive portfolio that leverages hybrid cloud solutions, business resiliency, and network services to help optimize your IT workloads and transformations.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

ExchangeDefender

ExchangeDefender

ExchangeDefender provides cybersecurity services that secures your company email and data, and guarantees 24/7 email access.

CYBRI

CYBRI

CYBRI is a cybersecurity company helping businesses detect and remediate mission-critical vulnerabilities before they get exploited by hackers.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.

Clear Ridge Defense

Clear Ridge Defense

Clear Ridge was founded in April 2015 with the mission and vision to support Joint, Service Cyber Components, and commercial clients in specialized cyber support.