News

2025-01-22

Cyber Attack Disrupts Eindhoven University 

A leading technical research university in the Netherlands is still recovering after being effectively shutdown by a debilitating cyber attack.

2025-01-23

Stargate - A Very Big Bet On AI Infrastructure

A $500billion investment in re-industrialising the USA, building a strategic capability to protect national security and competing with China.

2025-01-23

The Rising Threat Of Biometric Breaches & Stolen Data

Biometric data is increasingly a focus for criminals as they strive to steal valuable personal data to use against their targets. By Sam Peters

2025-01-22

Cyber Threat Forecast 2025 Part One - North America

Part 1 of a 4-part series that will forecast the international cyber threat landscape in 2025, beginning with North America. By Craig Watt

2025-01-20

Balancing Progress & Protection In Britain's Public Services

Citizen Experience: Transforming public services is a delicate process - innovation needs to be balanced with data protection. By Kam Bhatoa

2025-01-21

A New Era Of Digital Resilience For The EU

DORA Takes Effect: As cyber threats grow in complexity and with a growing reliance on digital infrastructure, DORA is a vital step. By Jamie Moles

2025-01-21

How SASE Fits Into The Modern Cybersecurity Landscape

Attackers Are Faster, Smarter & Relentless: Phishing emails, ransomware and sophisticated attacks are the norm. Enter SASE.

2025-01-21

Ukrainian Hackers Attack Russian Financial Services

550TB Of Data Destroyed: Russia's leading online trading platform, Roseltorg, has been attacked by a pro-Ukraine hacking group, Yellow Drift.

2025-01-20

Remote Deletion Of Malware Enforced On Thousands Of Computers 

The US Justice Dept. has confirmed completion of an operation ordering removal of PlugX Chinese malware infecting over 4,000 computers.  

2025-01-20

Data Broker Discloses A Major Breach Of App User Data

Misappropriated Access Key: Hacked data appears to have originated in thousands of smartphone apps, including Tinder, Grindr and Candy Crush.

2025-01-20

EU To Strengthen Cyber Defence In Healthcare  

The European Commission has a comprehensive plan to fortify the cyber security of hospitals & healthcare providers across the EU.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Lima Networks

Lima Networks

LIMA design and deliver IT Infrastructure solutions and services including managed Security Monitoring services.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

Assured Data Protection

Assured Data Protection

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations.

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

Usenix

Usenix

Usenix brings together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of computing.

Heimdal Security

Heimdal Security

Heimdal Security provides proactive protection against cyber threats including ransomware, exploit kits and financial malware.

Logsign

Logsign

Logsign is a Security Orchestration, Automation and Response (SOAR) platform with next-gen Security Information and Event Management (SIEM) solution.

EUROCONTROL

EUROCONTROL

EUROCONTROL is a pan-European, civil-military organisation dedicated to supporting European aviation. We help our stakeholders protect themselves against cyber threats.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

AlertSec

AlertSec

AlertSec Ensure is a U.S. patented technology that allows you to educate, verify and enforce encryption compliance of third-party devices.

Unlimited Technology

Unlimited Technology

Unlimited Technology offers a wide range of talent and experience, from assessing your requirements to implementing technologically advanced security solutions to best fit your needs.

Kocho

Kocho

Kocho (formerly TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

MadWolf Technologies

MadWolf Technologies

MadWolf’s mission is to deliver enterprise-quality managed services and focused applications to organizations operating in the non-profit, association and international development sectors.

Yondu

Yondu

Yondu empowers businesses across various industries through a wide array of innovative technology solutions to help them scale in the new digital economy.

Konsulko Group

Konsulko Group

Konsulko Group offers embedded Linux software and hardware development and Yocto Project services.