News

2022-11-09

Wanted - A New Generation Of Cyber Security Leaders

A Perfect Storm: Cyber security leadership is broken & failing to deliver cyber success for businesses, many of which don't understand the threat.

2022-11-08

Cyber Spy Group Uses IIS Web Software to Hack Targets

Cranefly: Hackers detected using a new technique that uses Internet Information Services (IIS) logs to open backdoors to reach their targets.

2023-01-13

A Snapshot Of Cyber Security In Britain

Britain 2021 - 2022: The numbers show a huge & growing range of activity - and the UK cyber security industry generated £10 billion in revenues.

2022-11-07

Japan Will Use AI To Secure Critical Infrastructure

Risk Based Maintenance: Using cloud-hosted SaaS software based on a decentralized database and distributed ledger technology.

2022-11-03

Leveraging Data Privacy For Artificial Intelligence

Widepread use of AI requires that individuals can trust public organisations to process their personal data fairly and safely. By Camilla Winlo 

2022-11-03

Is It Time To Consolidate Systems?

Too many businesses are managing multiple endpoints, incompatible dashboards & struggle to integrate systems with defences. By Colin Tankard

2022-11-03

The Do’s and Don’ts Of Security Risk Management

Risk management is not static and, done correctly, can bring about continuous improvement and business growth. By David Adams

2022-11-02

How Long Does It Take Before An Attack Is Detected?

Hackers can stay around in your network for a long time - organisations may not even know they have been attacked & robbed until it is far too late.

2022-11-02

Are Compromised Passwords Putting Your Company At Risk?

Compromised Passwords: To create a password policy fit for today’s threat landscape, you need to be looking at third-party alternatives.

2022-11-01

The Challenges Of Moving To Zero Trust

It's A Journey: Implementing a Zero Trust strategy must take account of both legacy technology and the timescale required. By Kevin Ware-Lane

2022-11-01

A Multi-layered Approach To Data Resilience

Going Beyond Backup & Recovery: Use automation, orchestration, multiple format copies & data snapshots to save critical data. By Florian Malecki

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Orolia

Orolia

Orolia are experts in deploying high precision GPS time through network infrastructure to synchronize critical operations.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

Decision Group

Decision Group

Decision Group are a Total Solution Supplier offering Network Forensics and Lawful Interception tools.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

NEC

NEC

NEC offers a complete array of solutions to governments and enterprises to protect themselves from the threats of digital disruption.

QSecure

QSecure

QSecure specializes in the provision of information security and risk management services.

Cybersecurity Tech Accord

Cybersecurity Tech Accord

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies.

Panorays

Panorays

Panorays automates third-party security lifecycle management. It is a SaaS-based platform, with no installation needed.

Stratosphere Networks

Stratosphere Networks

Stratosphere Networks offer managed cybersecurity services rooted in Managed Detection and Response and Security Operations Center services that our team can tailor to meet your needs.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

Lucidum

Lucidum

The Lucidum platform helps you assess risk and mitigate vulnerabilities by finding and correlating data from your security tech stack.

Hackurity.io

Hackurity.io

Hackurity.io is a high energy IT security start-up founded in 2021 out of the frustration that IT Security is highly fragmented and reactive.

Hetz Ventures

Hetz Ventures

Hetz Ventures is a global-facing VC investing in highly talented and ambitious Israeli founders who operate at the cutting edge of deep technology.

Radix Technologies

Radix Technologies

Radix offer end-to-end device management solutions, consolidating all the organization devices, processes and stakeholders into one easy-to-use management platform.

Technation

Technation

Technation proudly represents the Canadian technology companies that are furthering our nation and the world into the future through innovation, creativity and ingenuity.

Tulpa AI

Tulpa AI

Tulpa develops safe AI assistants (co-pilots) to support and enhance human performance in high-stakes, mission-critical decision-making environments.