News

2023-05-22

Web Application Security Testing: A Complete Guide

Web application security testing plays a vital role in protecting sensitive data from potential threats like SQL injection and cross-site scripting.

2023-05-19

How Unsupported Technologies Threaten Business Security

Obsolete software cannot be updated or patched and hackers know that unsupported applications are their opportunity. By Steve Whiter

2023-05-29

The Future Of Artificial Intelligence

AI is shaping the future of humanity across nearly every industry and will act as a technological innovator into the foreseeable future.

2023-05-19

France Fines Clearview AI For Failing To Pay The Previous Fine

Clearview has failed to cooperate with the French data regulator and ignored multiple requests to cease using biometric data without consent.

2023-05-18

How Can We Realise Cyber Resilience Through Education?

Education is key to enabling organisations to navigate the complex and ever-evolving landscape of cybersecurity threats. By Will Dixon

2023-05-18

Iranian Government Uses Android Malware For Mobile Surveillance

BouldSpy: Covertly installed Android spyware used to monitor arms shipments, surveil dissident & minority groups, alcohol and drugs trafficking.

2023-05-16

ABB Struck By Black Basta Ransomware

Hundreds of computers have been compromised as a result of a ransomware attack on the Windows Active Directory used by ABB. 

2023-05-16

The Philadelphia Inquirer Newspaper Hacked 

Unable To Print: The attack was first detected when editors & journalists found the newspaper’s content-management system was not working.

2023-05-16

Breach Will Cost Capita At Least £20m

Update: Capita faces a large bill to fix the damage caused and there could be significant consequential claims from its corporate customers.

2023-05-15

Higher Education: Lessons In Cybersecurity

With a large potential attack surface and big  rewards for hackers, it's easy to see why universities are high on the hit list. By Chris Boyle

2023-05-15

Effective Enterprise Vulnerability Management & Compliance

ManageEngine Vulnerability Manager Plus: The comprehensive and effective enterprise vulnerability management and compliance solution 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Quality Professionals (Q-Pros)

Quality Professionals (Q-Pros)

QPros are a recognized leader in providing full-cycle software quality assurance and application testing services.

National Authority Against Electronic Attacks (NAAEA) - Greece

National Authority Against Electronic Attacks (NAAEA) - Greece

The National Authority Against Electronic Attacks (NAAEA) is the national computer emergency response team of Greece.

netfiles

netfiles

netfiles offers highly secure data rooms for sensitive business processes and secure data exchange.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

Philippine National Police Anti-Cybercrime Group (PNP-ACG)

The mission of the PNP Anti-Cybercrime Group is to implement and enforce pertinent laws on cybercrime and other cyber related crimes and pursue an effective anti-cybercrime campaign.

Plexal

Plexal

Plexal is East London's innovation centre and co-working space. We offer startups flexible memberships, giving them access to office space plus all the benefits and support they need to scale.

Fortiphyd Logic

Fortiphyd Logic

Fortiphyd Logic equips operators of the power grid, oil & gas, and other critical infrastructure with the tools and training they need to defend their industrial networks from advanced cyberattacks.

Salvador Technologies

Salvador Technologies

Salvador Technologies provides the world’s fastest technology to recover from cyber-attacks.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

Dr Web

Dr Web

Since 1992 the Russian anti-virus Dr.Web has been helping companies to keep their digital assets protected and operate in a secure digital environment.

Atlantic Data Security

Atlantic Data Security

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure.

Sure Valley Ventures

Sure Valley Ventures

Sure Valley Ventures is an entrepreneur led venture capital fund focused on helping software entrepreneurs grow and scale businesses that will have a global impact.

Entitle

Entitle

Entitle's SaaS-based platform automates how permissions are managed, enabling organizations to eliminate bottlenecks and implement robust cloud least privilege access.

Morrow Global Network

Morrow Global Network

Morrow is the global venture network for venture accelerators, studios, hubs, and their visionary leaders.

Basalt

Basalt

Basalt provide qualified consulting services in information security, personnel security and physical security.