News

2023-06-05

Take Practical Measures To Avoid An Attack

The Common Threat: Failing to implement basic cyber security measures and not training your people presents an open door to hackers.

2023-06-02

How To Counter Covert Action In The Digital Age

The case of Iran shows that countering covert action in the digital age requires persistence. Also, it's unlikely to stop. By James Shires 

2023-06-02

Lawyer Admits To Using ChatGPT 

Unprecedented Circumstance: A New York lawyer is in trouble after using ChatGPT to verify case references which were found to be non-existent.

2023-06-01

Cyber Security In An Ever-Growing Digital World 

Digital Transformation: As more data-driven infrastructure technologies are introduced, the risk of cyberattacks increases. By Carl Shallow

2023-05-31

Microsoft 365 Under Threat From A New Phishing Tool

‘Greatness’: A sophisticated Phishing-as-a-Service tool deployed against manufacturing, healthcare & technology companies that use Microsoft 365.

2023-05-31

Can Automation Help Bridge The Cyber Skills Gap?

Finding key cybersecurity staff is increasingly difficult - UEBA, Threat Intelligence Automation & SOAR can offer solutions. By Tim Wallen

2023-05-29

Demystifying Data Privacy Compliance

The Importance Of Data Privacy Compliance: Learn the truth behind 6 common myths and avoid costly mistakes that could harm your business.

2023-05-30

Deepfakes Are A Growing Threat

Left unregulated, entire populations could have their opinions influenced by deepfakes delivering disinformation and distorting true events.

2023-05-30

Always-On Protection Using Immutable Storage

Immutability In Action: In the ever-changing world of data security compliance, Immutable Storage offers an ever-reliable solution. By Richard Massey.

2023-05-30

Europe - The DDoS Battlefield Of 2022

DDoS attacks are a reflection of major geo-political challenges and have become an increasingly significant part in hybrid cyber warfare. 

2023-05-29

Spy Agencies Warn Of New Threats From Chinese Hackers

Volt Typhoon: The Five Eyes group of western intelligence agencies has issued a notice detailing the nature of the threat from Chinese hackers.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Satisnet

Satisnet

Satisnet is a leading Security Reseller, Managed Security Services Provider (MSSP) and Cyber Training Innovator, with operations throughout the UK, EMEA and United States.

Intrinsic-ID

Intrinsic-ID

Intrinsic-ID's authentication technology creates unique IDs and keys to authenticate chips, data, devices and systems.

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

Assured Data Protection

Assured Data Protection

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations.

CamCERT

CamCERT

CamCERT is the national Computer Emergency Response Team for Cambodia.

IT Security House

IT Security House

IT Security House is a leading European supplier of Cyber Security Intelligence and eCrime services.

Flexential

Flexential

Flexential helps organizations optimize their journey of IT transformation while simultaneously balancing cost, scalability, compliance and security.

NLnet Labs

NLnet Labs

NLnet Labs is a not-for-profit foundation with a long heritage in research and development, Internet architecture and governance, as well as security in the area of DNS and inter-domain routing.

Wipro

Wipro

Wipro Limited is a leading global information technology, consulting and business process services company.

Secberus

Secberus

SECBERUS creates cloud security technology to help organizations stay secure & compliant in the public cloud.

High Wire Networks

High Wire Networks

High Wire Network’s Overwatch Managed Security Plaform-as-a-Service offers organizations end-to-end protection for networks, data, endpoints and users.

TriagingX

TriagingX

TriagingX successfully created the first generation malware sandbox that is being used by many Fortune 500 companies for daily malware analysis.

Anametric

Anametric

Anametric is developing new technologies and devices for chip scale quantum photonics, with a focus on cybersecurity.

Zitec

Zitec

One of Europe's largest and most prominent full-cycle software development services companies, Zitec is the digital transformation partner to companies in the EU, UK, USA, Canada and ME.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

Stern Cybersecurity

Stern Cybersecurity

Stern Cybersecurity offers a robust defense against the ever-evolving landscape of digital threats.

Koop

Koop

Koop’s trust management platform helps navigate the complexities of regulatory compliance, security reviews, and liability insurance in a single place.