News

2023-05-15

How Cybercriminals Profit From Your Personal Information

Protect Your Data Online: Multiple websites on the dark web are used for buying user information from cyber criminals - you should take precautions.

2023-05-12

Businesses Must Prepare For 90-Day Certificates

Google’s 90-Day Certs Are Coming: With enough time to prepare & automation readily available, there is no excuse to be caught out. By Tim Callan

2023-05-15

Which Sectors Are Top Targets For Cyber Crime?

Banks, Healthcare & Food Retailers: The latest threat intelligence from Blackberry found 60% of all attacks targeting these three key industries.

2023-05-12

What Is The Difference Between Phishing, Smishing & Vishing? 

An Internet user falls victim to cybercrime every 37 seconds: The more we understand scams, the better equipped we are to avoid becoming victims. 

2023-05-11

What The Latest Cybersecurity Trends Mean For Your SME 

Prevention Is Better Than Cure: Employee awareness, a protected domain name and strong authentication protocols can help manage risk.

2023-05-10

NSA Warning: China Is Stealing AI Technology

The US National Security Agency tells US technology companies to be aware of Chinese attempts to steal their Artificial Intelligence technology.

2023-05-10

Ransomware Attack Hits US Shipyard

The shipyard building the US Navy’s Littoral Combat Ship & Constellation-class guided-missile frigate has suffered a ransomware attack.

2023-05-10

Open Source Software In The Cloud

Researchers have linked the significant use of open source software to an increased need for high levels of vigilance by users. 

2023-05-10

Smart Gun Uses Facial Recognition Technology

James Bond's Pistol: A gun that can only be fired after verifying the shooter’s identity uses facial recognition and fingerprint technology.

2023-05-17

Google’s New Cyber Security Certificate Program

Careers: Google has a new six month entry-level US certification training program aimed at a new generation of cyber security professionals.

2023-05-17

Mobile Phone Chip Company Collects User’s Private Data

Leading Android chipmaker found uploading users' private data, including IP addresses to a cloud attributed to the company, without their consent.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

KPN Security

KPN Security

KPN Security is the largest and most complete provider of IT security services in the Netherlands.

itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, and cost reducing solutions for IT operations.

D3 Security

D3 Security

D3's Smart SOAR platform is at the forefront of the security automation revolution, helping clients around the world to rapidly identify, analyze, and resolve advanced threats.

Early Warning Services

Early Warning Services

Early Warning is committed to providing awareness, education, and enablement around fraud prevention.

Massive Alliance

Massive Alliance

Massive is a global service agency providing internet monitoring, data & security threat surveillance and reputation management.

Living Security

Living Security

Living Security specializes in metric driven and engaging security awareness solutions that reduce risk by increasing security culture and changing employee behaviour.

Exponential-e

Exponential-e

Exponential-e provide Cloud and Unified Communications services and world-class Managed IT Services including Cybersecurity.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

SECFORCE

SECFORCE

SECFORCE is a leading information security consultancy specialising in bespoke penetration testing and red team engagements.

Gray Analytics

Gray Analytics

Gray Analytics is a Cybersecurity Risk Management company providing best-practice services across a broad spectrum of cyber scenarios for both government and commercial customers.

NightDragon

NightDragon

NightDragon is a venture capital firm investing in innovative growth and late stage companies within the cybersecurity, safety, security, and privacy industry.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

Appalachia Technologies

Appalachia Technologies

Appalachia is a full service Managed Services Provider with a focus on cybersecurity, backed by the best engineers.

Tentacle

Tentacle

Tentacle has developed a configurable data management tool that helps organizations to improve their information security programs and overall security posture.

Questex Asia Total Security Conference

Questex Asia Total Security Conference

Questex Asia’s Total Security Conferences is one of the industry’s most prestigious and engaging forums for the region's top information security leaders and business decision-makers.

Emerge Digital

Emerge Digital

Emerge Digital is a technology and digital innovation business and Managed Services Provider providing solutions to SMEs.

RapidFort

RapidFort

RapidFort’s Software Attack Surface Optimization Platform remediates 95% of software vulnerabilities in minutes without code changes.

Datos Insights

Datos Insights

Datos Insights is a leading global provider of insights, data, and advisory services to the financial services, insurance, and retail technology industries.