News

2025-02-18

Ukraine Warns Of Growing Russian Use Of AI In Cyberwar Operations

Ukrainian cyber experts say Russia is using AI tools to analyse data stolen in cyber attacks, making its operations more precise & effective.

2025-02-14

Navigating The Latest Paths In Cybersecurity Certification

Organisations are looking for people with specialized cyber skills, and one of the best ways to validate your expertise is reputable certification.

2025-02-17

US DOGE.gov Website Found Wide Open

Transparency Gone Too Far: Elon Musk’s DOGE.gov website set up to identify government efficiency is open to be edited by anyone.

2025-02-14

Britain Fast-Tracks Military Recruitment For Cyber Defence

Less Rifle Drill, More Keyboard Drill: New cyber service personnel will have reduced basic training before three months of special cyber training.

2025-02-17

Business Interruption Is The #1 Cyber Risk

Cyber security risk, including ransomware, data breaches and IT disruptions, remain the top business concern worldwide over the past year.

2025-02-17

US Researchers Launch A DeepSeek Competitor

Fine-Tuning: DeepSeek's low-cost development model has been quickly replicated, producing a functioning AI at astonishingly low cost.

2025-02-15

Thai Police Arrest Russian Hackers

Phobos Ransomware: Hackers stole $16m through ransomware attacks targeting Swiss & US targets, affecting over 1,000 victims worldwide.

2025-02-13

US & Britain Refuse to Sign International AI Declaration

Despite being the original champion of international rules for AI Governance, Britain has sided with the US in rejecting the next steps.

2025-02-12

NATO Technology Partner Expands UK Operation

Goldilock: British manufacturing business grows fast to supply demand for its network isolation technology, used to secure critical infrastructure.

2025-02-12

Indian Banks Aim To Reduce Online Fraud

Additional Factor Authentication: A Central Bank initiative to improve the security of cross-border & online payments where a card is not present.

2025-02-12

LinkedIn Is A Focal Point For Cyber Crime

LinkedIn may be a vital tool for job seekers and professionals, but it has also become an open target for cyber criminals exploiting its credibility. 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

Viavi Solutions

Viavi Solutions

Viavi Solutions is a global leader in both network and service enablement and optical security performance products and solutions.

totemo

totemo

Totemo offers solutions for the secure exchange of business information.

RIGCERT

RIGCERT

RIGCERT provides training, audit and certification services for multiple fields including Information Security.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

GoCyber

GoCyber

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

Haven Group

Haven Group

Haven Group and its companies are a cyber security one-stop-shop for our clients offering a full range of cyber security services to our clients in a unified and united way.

DisruptOps

DisruptOps

Built for today’s cloud-scale enterprises, DisruptOps’ Cloud Detection and Response platform automates assessment and remediation procedures of critical cloud security issues.

Intersistemi Italia

Intersistemi Italia

Intersistemi is a leading Italian company in the field of information technology integration and digital transformation including cybersecurity.

BitTrap

BitTrap

BitTrap helps companies worldwide detect attackers and put an early end to breaches, preventing data exfiltration and ransomware altogether.

Avalanchio Technologies

Avalanchio Technologies

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL or SQL.

Condition Zebra

Condition Zebra

Condition Zebra has wide experience in providing IT Security Services, Training, and Certification in the field of cybersecurity.

Zanutix Consulting

Zanutix Consulting

Zanutix specialize in a wide range of services including Network Design and Implementation, Data Management, Cloud Solutions, Software Development and Cybersecurity.