News

2022-11-01

A Multi-layered Approach To Data Resilience

Going Beyond Backup & Recovery: Use automation, orchestration, multiple format copies & data snapshots to save critical data. By Florian Malecki

2022-11-01

Proactive Cyber Security Is A Must Have

When 'You're being offensive" is a compliment: Playing the enemy at their own game using offensive cyber security practices. By Pablo Zurro

2022-11-01

Cyber Security Threats For The US Midterm Elections

Election officials have been alerted to protect their voting systems and be vigilant about political violence in a "very complex threat environment."

2022-10-31

British Prime Minister’s Phone Hacked

Agents suspected of working for Russia were responsible for the alleged hacking of Liz Truss's mobile phone while she was Foreign Secretary.

2022-11-07

Artificial Intelligence & Its Impact On Cyber Security

Detecting the most dangerous attacks that can take down the network, versus intrusions which are problematic but won't take everything down.

2022-10-31

Make Sure Your MSP Isn’t Your Security Achilles’ Heel

Supply Chain Risks: Seven traits you need to identify to be sure your Managed Services Provider has a strong security stance. By Leyton Jefferies

2022-10-29

US Military Involved In Ukraine's Cyber Defences

US Cyber Command teams are engaged in "Hunt Forward" missions, searching the computer networks of its allies for signs of penetration.

2022-10-31

Ed Sheeran's Music Pirate Jailed

Spirdark: A hacker has been convicted for copyright theft after stealing 1,263 unreleased songs by 89 artists and selling them on the Dark Web.

2022-10-28

Iranian Hackers Target US Midterm Elections

An Iranian threat group is preparing to interfere in the forthcoming US elections, targeting officials & companies involved with the voting process.

2022-10-26

The Five Stages Of A Cyber Attack

Attack Paths Matter: Escalating access privileges from Ordinary User to Admin can give attackers almost unlimited power. By Bryan Patton

2022-11-17

NordLayer - An Adaptive Network Access Security Solution For Modern Businesses

Limited Special Offer: Secure remote network access for your organization - ensure your employees & corporate data are safe anytime, anywhere.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Sage Designs

Sage Designs

Sage Designs is a provider of SCADA, Security & Industrial Automation products and training programs.

GovCERT Austria

GovCERT Austria

GovCERT Austria is the Austrian Government Computer Emergency Response Team. Its constituency consists of Austria's public administration.

Cyscale

Cyscale

Cyscale automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

Paladin Capital Group

Paladin Capital Group

Paladin is a leading global investor that supports and grows the world’s most innovative cyber companies.

ComoNExT Innovation Hub

ComoNExT Innovation Hub

ComoNExT is a Digital Innovation Hub and a startup incubator with a focus on the issues of digital transformation and Industry 4.0.

iHLS Startups Accelerator

iHLS Startups Accelerator

iHLS Accelerator is the first startup accelerator in the world in the security and homeland security field.

Kinnami Software

Kinnami Software

Kinnami is a data security company that equips organizations with the tools they need to secure and protect highly confidential documents and data.

ScorpionShield

ScorpionShield

ScorpionShield CyberSecurity is an EC-Council Accredited Training Center, and an On-Demand Service for Cybersecurity professionals.

Soteria

Soteria

Soteria is a global leader in the development, integration and implementation of advanced cyber security, intelligence and IT solutions, delivering complete end-to-end solutions.

PlexTrac

PlexTrac

PlexTrac is a cybersecurity reporting and workflow management platform that supercharges security programs, making them more effective, efficient, and proactive.

Gridware

Gridware

Gridware is a specialised cybersecurity consultancy firm and an emerging global player in the cybersecurity intelligence and advisory field.

Intelligent Technical Solutions (ITS)

Intelligent Technical Solutions (ITS)

We help businesses manage their technology. Intelligent Technical Solutions provide you with the right technical solution, so you can get back to running your business.

Bulletproof Solutions

Bulletproof Solutions

Bulletproof provides IT expert support, services, and guidance to businesses small and large as they grow and adapt to today’s complex IT, cybersecurity, and compliance needs.

Cyber Unicorns

Cyber Unicorns

Cyber Unicorns is a cyber security consultancy created to help drive cyber security outcomes in the small to medium-sized business space.

Reveald

Reveald

Reveald is making Exposure Management a reality to solve the biggest challenges in cybersecurity with a trailblazing ‘offense to defense’ approach that gives the advantage back to the business.