News

2023-01-06

British Spy Chief Says War In Ukraine Is Changing Intelligence Gathering

Cyberwar: Ransomware, phishing and DDoS attacks are just a few of the many weapons that states are now using in geopolitical conflicts.

2023-01-09

Spying On Mobile Phone Calls

EarSpy: Smartphone manufacturers’ efforts to improve audio in their devices has led to new vulnerabilities, including unprotected earspeakers.

2023-01-09

Cybersecurity: Prepare For The Year Ahead

Back-to-Basics: Cybersecurity threats and regulation will evolve in the next year, yet many aspects will remain the same. By Simon Eyre 

2023-01-09

Web Browser Attacks & How To Combat Them

The web browser has become the biggest attack surface available to threat actors, who are actively leveraging and exploiting it. By Jonathan Lee

2023-01-09

Why We Should Worry About A War On Cybercrime

Critical Infrastructure: Cyber attacks are transitioning from being an issue of enterprise security to one of risk to public safety. By Will Dixon

2023-01-06

PAM, IAM, Or Both?

Useful But Different: Identity & Access Management (IAM) and Privileged Access Management (PAM) are not the same thing. By Colin Tankard

2023-01-06

EU Fines Meta $416m

Targeted Advertising: Ireland's Data Commissioner rules that Meta used peoples' data for adverts on Facebook and Instagram unlawfully.

2023-01-04

Multi-Factor Authentication Is No Shortcut To Cyber Resilience

Persistence Pays Off For Hackers: There's more to cyber resilience than MFA and broader technological & cultural changes are needed. By Adrian Odds

2023-01-03

Security Risks In 5G Mobile

Insecure By Design: 5G network slicing offers a widespread threat that includes potential weak points in policy, standards & supply chains.

2023-01-03

Biden Signs Quantum Cyber Security Act

Q Day: The law is designed to secure US government systems & data against the fast approaching threat of quantum-enabled data breaches.

2023-01-03

2023 Tech Predictions

This year will see IT teams using new tools & strategies to counteract the expanding threat landscape. Here are a few predictions. By James Karimi

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

SSL247

SSL247

SSL247 is Europe's leading Web Security Consultancy Firm. We enjoy long-standing partnerships with Certificate Authorities including Symantec, GlobalSign, Entrust Datacard, Comodo, Thales and Qualys.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

Sogeti

Sogeti

Sogeti deliver solutions that enable digital transformation and offer cutting-edge expertise in Cloud, Cybersecurity, Digital Manufacturing, Quality Assurance, Testing, and emerging technologies.

Crest International

Crest International

Crest is focused on professionalizing the technical cyber security market whilst driving quality and standards of organizations that operate within it.

GreyCastle Security

GreyCastle Security

GreyCastle Security is a leading cybersecurity services provider dedicated exclusively to cybersecurity and the practical management of cybersecurity risks.

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

National Cyber and Information Security Agency (NUKIB) - Czech Republic

National Cyber and Information Security Agency (NUKIB) - Czech Republic

NUKIB is the central Czech government body for cyber security, the protection of classified information in the area of information and communication systems and cryptographic protection.

Navarino

Navarino

Navarino is the maritime industry’s most advanced communications and connectivity company. We develop advanced technologies and innovative IT solutions including cyber security.

Threatspan

Threatspan

Threatspan is a cybersecurity firm helping shipping and maritime enterprises achieve and maintain nautical resilience in an age of increasing cyber threats.

Baker Donelson

Baker Donelson

Baker Donelson is a law firm with a team of more than 700 attorneys and advisors representing more than 30 practice areas including Data Protection, Privacy and Cybersecurity.

Slice

Slice

Slice offer subscription based Cyber Insurance for small businesses.

Nu Quantum

Nu Quantum

Nu Quantum is developing quantum photonics hardware to power the quantum revolution in communications, sensing and computing.

M2MD Technologies

M2MD Technologies

M2MD Technologies offers solutions optimized for cellular IoT that provide stronger security, reduced costs, enhanced user experience, and ultimately generates higher returns for stakeholders.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.

Cypherleak

Cypherleak

Cypherleak provide Automated Cyber Risk Monitoring & Ai powered cyber recommendations.

Exertis Cybersecurity

Exertis Cybersecurity

Exertis Cybersecurity is a sub-division of Exertis Enterprise. We provide market-leading cybersecurity solutions that help to address the cybersecurity challenges that organisations face today.