News

2022-08-03

New British Cyber Advisor Scheme

The NCSC is launching a Cyber Advisory Service to extend a trusted source of cyber security advice to a wider range of organisations. 

2022-08-03

How to Prepare Your Security Team For The Future Of Vulnerability Management

Vulnerabilities Are Not Equal: Security teams should use a risk-based vulnerability prioritization, automated tools & effective controls. By Lisa Xu

2022-08-03

Publicly Reported Ransomware Incidents Are Just The Tip Of An Iceberg

ENISA 2022 Threat Landscape Report: Ransomware is one of the most devastating types of cyber attacks, yet is going widely unreported.

2022-08-03

Flunking Cyber Education

Layer Cake: Decision makers, middle managers and the IT experts who actually do the job need to communicate much better. By Ronald Marks.

2022-08-02

Google Chrome Extension Used To Steal Emails

SHARPEXT: A N. Korean threat group is using a malicious browser extension to steal emails from Google Chrome users while they read their webmail.

2022-08-02

Mercenary Hacking Group Selling Spyware

Subzero Spyware: Microsoft have discovered a powerful exploit being used to hack law firms, banks and strategic consultancies around the world.

2022-08-02

For Sale: 5.4m Twitter Users’ Data

Devil In The Detail: The information for sale allegedly comprises phone numbers & email addresses, including celebrities and numerous companies.

2022-08-01

Over One Hundred Arrests In Business Email Compromise Swoop

Members of the criminal group included computer experts, who created the phishing domains and carried out a sophisticated email fraud.

2022-08-01

Why A Managed Security Service Provider Should Be On Your Cyber Roadmap

Organisations need resilient cyber security strategies to protect against complex threats and Managed Services could be the answer. By Francis O’Haire

2022-08-01

How IAST Improves Application Security & Six Steps to Effective Deployment

Interactive Application Security Testing provides a quick and effective solution to vulnerability detection. Here are the most common applications.

2022-07-28

Is Your Anti-Virus Doing Its Job?

Anti-Virus Alone Is Not Good Enough: Organisations need to take a broad approach to stop bad code entering their network. By Colin Tankard

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

4ARMED

4ARMED

4ARMED services cover the end-to-end experience of securing modern software, from design and build through to deploy and test.

it-sa 365

it-sa 365

it-sa 365 is a digital platform for connecting IT security vendors and experts with those who bear responsibility for IT security in management and technology.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

infySEC

infySEC

InfySEC is an information security services organization offering Security Technology services, Security Consulting, Security Training, Research & Development.

Foundries.io

Foundries.io

Foundries.io have built a secure, open source platform for the world's connected devices, and a cloud service to configure this to any hardware and any cloud.

Guardio

Guardio

Guardio develop tools and products to combat modern web and browser threats.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

LastPass

LastPass

LastPass provides award-winning password and identity management solutions that are convenient, effortless, and easy to manage.

Casepoint

Casepoint

Casepoint is the legal technology platform of choice for corporations, government agencies, and law firms to meet their complex eDiscovery, investigations, and compliance needs.

turingpoint

turingpoint

turingpoint GmbH is a tech enabled boutique consultancy. It was founded by security experts with a focus on cyber security and software solutions.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.

ClearFocus Technologies

ClearFocus Technologies

ClearFocus Technologies provides advanced cybersecurity services that secure our nation’s most sensitive assets.

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions is a managed security service provider that humanizes cybersecurity managed services to the Small-to-Medium Business (SMB) and Small-to-Medium Enterprise (SME) sectors.

Anjolen

Anjolen

Anjolen provides expertise in cybersecurity, compliance and cyber forensic services.

Ryan Financial Lines

Ryan Financial Lines

Ryan Financial Lines Cyber provides risk transfer solutions for complex cyber and technology exposures, globally.