News

2025-02-12

AI Love You This Valentine's Day

Fauxmance: With AI, Deepfake and Romance Fraud booming, new McAfee research reveals one in two believe AI chatbots could steal their heart.

2025-02-11

AI-Based Phishing Attacks Demand A Multi-Pronged Response

New Techniques Demand A Zero Trust Mindset: A new strategy for combating AI-powered phishing attacks is needed. By Oliver Paterson

2025-02-11

DeepSeek Exposes Sensitive Data

Major Security Issues: DeepSeek sends sensitive data over the Internet without encryption, exposing it to interception & manipulative attacks.

2025-02-10

Apple Ordered To Give Access To Users' Encrypted Data

Investigatory Powers: British law enforcement have demanded access to encrypted data stored by Apple users in its global cloud service.

2025-04-24

The Leading Israeli Cyber Security Companies 

Israel is a powerhouse in the cyber security domain, with numerous start-ups, established companies, research institutions & government initiatives. 

2025-02-07

Combating Cyber Threats In The Age Of AI 

AI-powered tools are driving the many ways that cybercriminals deceive businesses into exposing their most sensitive information. By Phil Calvin

2025-02-07

Managing Dark Web Exposure In 2025

Navigating The Shadowy Frontiers: The dark web’s trade in stolen data presents several big challenges for organisations. By Vishaal Hariprasad

2025-02-12

British Cyber Code Of Practice For Developing AI

The code applies to developers, system operators, and data custodians at organisations that create, deploy, or manage AI systems.

2025-02-11

Hackers Innovate To Attack Microsoft 365 Accounts

High Speed Brute Force: Hackers have been using HTTP client tools for sophisticated account takeover attacks on Microsoft 365 environments.  

2025-02-07

Australia Bans DeepSeek In Government Networks

Backlash: Australia has banned DeepSeek from all their government systems because of what it says is an unacceptable national security risk.

2025-02-13

Texas Creates Its Own Cyber Command Center

Texas is the eighth largest economy in the world, with numerous Oil, Gas, Financial & Military targets for cyber criminals and nation state actors.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

4Secure

4Secure

For over two decades, 4Secure has specialised in cyber security consultancy, safeguarding the worlds critical Infrastructure through securely bridging air gapped networks.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

ThreatHunter.ai

ThreatHunter.ai

ThreatHunter.ai (formerly Milton Security) is a business that tracks down and mitigates attacks in real time using our ARGOS Platform and our Elite Threat Hunters.

Raytheon Technologies

Raytheon Technologies

Raytheon Intelligence & Space delivers solutions that protect every side of cyber for government agencies, businesses and nations.

Sage Designs

Sage Designs

Sage Designs is a provider of SCADA, Security & Industrial Automation products and training programs.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

Lexsynergy

Lexsynergy

Lexsynergy is a global domain name management and online brand protection company.

Onclave Networks

Onclave Networks

Onclave Networks is a global cybersecurity leader, transforming the future of securing all IT/OT devices and systems.

Pivot Technology School

Pivot Technology School

Pivot Tech offers Data Analytics, Software Development and Cyber Security training in boot camp style cohorts.

Chartered Institute of Information Security (CIISec)

Chartered Institute of Information Security (CIISec)

CIISec is dedicated to helping individuals and organisations develop capability and competency in cyber security.

Splashtop

Splashtop

Splashtop’s cloud-based, secure, and easily managed remote access solution is increasingly replacing legacy approaches such as virtual private networks.

European Union Agency for Network and Information Security (ENISA)

European Union Agency for Network and Information Security (ENISA)

The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe.

Network Contagion Research Institute (NCRI)

Network Contagion Research Institute (NCRI)

NCRI provides pioneering technology, research, and analysis to identify and forecast cyber-social threats targeting individuals, organizations, and communities.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

DataKrypto

DataKrypto

DataKrypto’s advanced data encryption solutions protect data throughout its lifecycle.

CQURE

CQURE

CQURE is divided into four main cybersecurity excellence areas: CQURE Consulting, CQURE Academy, CQURE Knowledge Sharing and CQURE Cyber Lab.