News

2023-01-16

The Internet of Vehicles - Connected Cars

IoV: Some day soon, every car will become connected, with warning sensors, road hazard detections, and vehicle-to-pedestrian communication.

2023-01-14

The Application Of Artificial Intelligence In Cybersecurity

AI based cybersecurity technologies have evolved to assist information security teams in reducing breach risk & improving resilience. By Mike Sandru

2023-01-14

2023 - Cyber Threats To US Infrastructure 

Malware attacks on healthcare & other critical infrastructure, plus the escalating costs of ransomware are focusing minds in the US government.

2023-01-13

Dissent Over British  Internet Safety Laws

In addition to heavy fines, senior managers of social media firms could face two years in jail if they breach new duties to keep children safe online

2023-01-13

British Royal Mail - 'Cyber Incident'

The Royal Mail’s overseas mail deliveries have been hit by a cyber attack, halting international deliveries until systems are restored.

2023-01-13

The FBI’s Advice On Ransomware

Part of the FBI's mission is to raise awareness about ransomware, using its global intelligence network to help victims respond and recover.

2023-01-11

2023 - Threat Intelligence Predictions

EIQ's Intelligence Team: Extortion will evolve, cyber criminals will take sides in Ukraine, Russia's cyberwar will fail and ChatGPT will take off.

2023-01-11

Crypto Currency: From Bitcoin to Blockchain

Everyone Understands Crypto Currency - Or Do They? As the market dives, everything you need to know about crypto, but were afraid to ask.

2023-01-10

Zero Trust In (remote) Access

Caution Is Better Than Indulgence: Zero trust offers small companies a level of security equivalent to that of large enterprises. By Paddy Srinivasan

2023-01-10

Chinese Spy Device Found Hidden In British Government Car

Concerns over the covert use of Chinese spyware prompted intelligence operatives to investigate British government & diplomatic vehicles.

2023-01-10

Five Data Security Trends Organisations Must Deal With

In 2023 business challenges of all kinds are growing more difficult to identify and solve. Data protection is one of them. By Florian Malecki

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

Cyber Senate

Cyber Senate

Cyber Senate is dedicated to bringing Operators of Essential Services together with global subject matter experts to address the challenges of evolving cyber threats to critical infrastructure.

Emsisoft

Emsisoft

Emsisoft protects your devices against all types of malware, ransomware and other threats with no-bloat anti-malware & antivirus solutions.

Vuntie

Vuntie

Vuntie blend European craftsmanship, performance and open-source technology to deliver cybersecurity services including penetration testing, incident response, training and consultancy.

Axiomtek

Axiomtek

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

Cybersecurity Collaboration Forum

Cybersecurity Collaboration Forum

The mission of the Cybersecurity Collaboration Forum is to foster information security communication and idea sharing across the C-Suite, enabling leaders to better protect their enterprises.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

Salvador Technologies

Salvador Technologies

Salvador Technologies provides the world’s fastest technology to recover from cyber-attacks.

Axio Global

Axio Global

Axio is a leading cyber risk management SaaS company. Our Axio360 platform gives companies visibility to their cyber risk, and enables them to prioritize investments to protect their business.

Gigit

Gigit

Gigit’s Service portfolio focuses on your business’ needs and the integration of comprehensive cybersecurity policies, plans, procedures, and practices into your business culture and operations.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

SilverEdge Government Solutions

SilverEdge Government Solutions

SilverEdge is a next generation provider of innovative and proprietary cybersecurity, software, and intelligence solutions for the Defense and Intelligence Communities.

The CyberWire

The CyberWire

The CyberWire gets people up to speed on cyber quickly and keeps them a step ahead in a continually changing industry.

Nokod Security

Nokod Security

Nokod Security delivers an application security platform for low-code / no-code custom applications and Robotic Process Automation (RPA).

Xantaro

Xantaro

Xantaro specializes in technologies, software and services for Carriers, ISPs, Hosting and Cloud Providers as well as for Operators of Data Centres and Campus Networks.