News

2023-06-08

A House Of Cards

The Risk Of Losing User Trust: The Capita incident showcases the importance of cybersecurity in Digital Transformation. By Paul Holland

2023-06-07

Ransomware Trends In The Aviation & Maritime Industries

Transport sector organisations have a distinctive profile from an attacker’s perspective, making them an especially lucrative target.

2023-06-07

Cyber Security Insurance - What You Need To Know

Cyber Insurance is a smart precaution for any size business, but what does it typically include and how do you make a good policy choice?

2023-06-07

Update: BBC, British Airways & Boots In Supply Chain Attack

CLOP: Hackers found a software vulnerability to penetrate a growing number of UK firms in a major supply chain exploit. Now they want ransom.

2023-06-06

British Business Moves To Adopt Digital Identity

More than half of UK organisations either currently use digital identity or plan to soon incorporate digital identity solutions into their operations.

2023-06-05

Musk's Brain Chip Firm Gets US Approval for Human Analysis

Elon Musk's brain-chip company Neuralink has now been approved by the US Food and Drugs Administration (FDA) to conduct human tests.

2023-07-05

Advanced Phishing Attacks Tripled In 2022

Protecting Organisations Is More Important Than Ever: Hackers are using new tools to simplify & automate the process of generating attacks.

2023-07-12

Iranian Hackers Using Windows Kernel Driver

Agrius Threat Group: Iranian hackers are using a new Windows kernel driver called Wintapix to get unauthorized access to targeted systems.

2023-06-07

A New Approach To Cyber Security Helps Resist Extortion

Nearly 80% of organisations hit by ransomware are capable of recovering their critical data & systems, without paying a ransom.

2023-07-05

A Decade Of ‘Bad Magic’ In Cyber Espionage

Sophisticated Malicious Activities: A modular framework codenamed CloudWizard, which can take screenshots, record microphones & steal Gmail.

2023-07-04

The Limitations of AI

'Truth Is The Bottom Line': Carl Bernstein has warned that Artificial Intelligence is creating serious challenges for the future of journalism.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA) offer commercial insurance services including Cyber Liability insurance.

CipherMail

CipherMail

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest.

AAROH

AAROH

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & fraud.

4Stop

4Stop

4Stop is a global KYC, compliance and anti-fraud risk management company.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

Axis Security

Axis Security

Axis Security technologies transform open networks and vulnerable applications into fully protected resources that the business can trust.

European Cyber Competence Network

European Cyber Competence Network

The purpose of the European Cyber Competence Network is to retain and develop the cybersecurity technological and industrial capacities of the EU necessary to secure its Digital Single Market.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

Randaemon

Randaemon

RANDAEMON’s mission is to create True Random Number Generators (TRNG) that are hardware-based and integrated into System-on-Chip.

Bluewave

Bluewave

Bluewave are a strategic IT advisory company that offers businesses a simple and comprehensive way to purchase information technology solutions.

CyberloQ Technologies

CyberloQ Technologies

CyberloQ Secure is a cybersecurity solution that enables clients to implement highly robust Multi-Factor Authentication (MFA) that includes client-defined location-based geofencing constraints.

ANSSI Burkina Faso

ANSSI Burkina Faso

ANSSI is responsible for managing the security of information systems and cyberspace in Burkina Faso.

Corinium Global Intelligence

Corinium Global Intelligence

At Corinium, we have been bringing together the brightest minds in data, AI and info sec since 2013, to innovate at the intersection of technological advancements and critical thinking.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

modePUSH

modePUSH

modePUSH is a cybersecurity company focused on end-to-end breach response from Digital Forensics to Restoration across the enterprise and cloud environments.