News

2022-09-16

Containers Are Temporary, But Container Data Is Not

Keep A Lid on It: Containerisation has benefits for application development. It also holds challenges for data backup & recovery. By Florian Malecki

2022-09-15

Three Simple Steps To Effective Cybersecurity

Left, Right & Up: Three key steps that all organisations should follow if they are to ensure effective cybersecurity protection. By Allen Downs

2022-09-15

The NSA Hacked Huawei Long Ago

The NSA penetrated Huawei's network technology ten years ago and can likely take steps to restrict & prevent any damaging or malicious activity.

2022-09-15

Using SAST To Prevent Zero Day Vulnerabilities

Static Application Security Testing: SAST solutions are widely agreed to be an important part of a secure software development lifecycle.

2022-09-15

Five Cloud Security Mistakes Your Business Should Avoid

Cloud security is crucial to your company’s data safety. Familiarize yourself with these cloud security mistakes that your business should avoid.

2022-09-14

NATO Secrets Found For Sale On The Dark Web

Insecure Channels: Secret NATO documents exfiltrated from supposedly secure Portuguese military computers identified by US intelligence.

2022-09-14

Securing Hybrid Identity

Active Directory: Hybrid environments are prone to errors & misconfigurations that leave the door wide open to cyber attacks. By Guido Grillenmeier 

2022-09-14

India's Health Systems Are A Top Target

Rapid digitisation of the Indian healthcare sector was driven by Coronavirus, but it has left numerous vulnerabilities that are now being exploited.

2022-09-13

New Cyber Security Laws For Telecoms Providers

Britain’s telecoms industry is getting new security regulations, with data protection requirements that will be among the strongest in the world.

2022-09-13

Evil Has New Cyber Weapons

TeslaGun: The Evil Corp ransomware gang, best known for Dridex banking malware, has expanded its cyber weapons arsenal to include cryptomining.

2022-09-12

US Tech Firms Forbidden To Manufacture In China

Technology firms that have had US federal funding will be prevented from creating advanced technology factories in China for at least a decade.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Baker McKenzie

Baker McKenzie

Baker & McKenzie is an international law firm. Practice areas include Data & Technology.

IntaForensics

IntaForensics

IntaForensics offer a full range of digital investigation services and are able to adapt to the individual needs of solicitors, private clients, Law Enforcement Agencies and commercial businesses.

Immersive

Immersive

Immersive unifies Cyber Drills, Exercises, Sims, Ranges, and Training into one single, adaptive platform. One Platform. Total Cyber Resilience.

DataProtect

DataProtect

DataProtect is a specialized information security company providing consultancy, information management, integration and training services.

Visium Technologies

Visium Technologies

Visium Analytics provides innovative data visualization, cybersecurity technologies and solutions to businesses to protect and secure their data assets.

Velta Technology

Velta Technology

Velta Technology provide digital safety and cybersecurity solutions for the industrial space.

Bloc Ventures

Bloc Ventures

Bloc Ventures is an investment company providing long-term, ‘patient’ equity capital to early stage unquoted deep technology companies.

Infinite Ranges

Infinite Ranges

Infinite Ranges delivers secure, comprehensive digital solutions by connecting experts with the best products and services for the digital age.

Dr Web

Dr Web

Since 1992 the Russian anti-virus Dr.Web has been helping companies to keep their digital assets protected and operate in a secure digital environment.

Gradient Cyber

Gradient Cyber

Gradient Cyber offer mid-market organizations enterprise-grade threat detection and response services at a fraction of the cost of an in-house SOC.

Pathlock

Pathlock

Pathlock (formerly Greenlight) help enterprises and organizations automate the enforcement of any process, access, or IT general control, for any business application.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

Lineaje

Lineaje

Lineaje solves critical Software Supply Chain security problems faced by every organization that builds, uses or sells software.

CyberEPQ

CyberEPQ

CyberEPQ (Cyber Extended Project Qualification) is the UK’s first and only Extended Project Qualification in Cyber Security.

Quotient

Quotient

Quotient builds digital experiences that empower and inspire the American people by understanding their needs, simplifying complex technical solutions and adapting to how they work, live and learn.

Syntura

Syntura

Syntura is your trusted partner for advisory, infrastructure and managed services.