News

2022-06-22

REvil Have Returned - Or Have They?

Criminals claiming to be from the extinct ransomware gang are targeting Akamai customers with a DDoS attack, demanding Bitcoin.

2022-06-13

Zoom Can Expose You To Cyber Attacks

The video-conference platform Zoom has disclosed four new software problems and vulnerabilities that can expose users to cyber attacks.

2022-06-15

Critical Business Systems Left Unmonitored & Insecure

Risky Business: Over 40% of companies don't include their core IT infrastructure systems in their routine cyber security monitoring activities.

2022-06-15

Using Artificial Intelligence In Military Operations

In modern warfare there is a necessity to keep pace with the volume and complexity of data being generated and now the US military is turning to AI.

2022-06-14

Ransomware’s Serious Effects On Cyber Security

Ransomware has rapidly evolved from a criminal 'malware incident' to a national security threat, in some cases successfully extorting $millions. 

2022-06-14

Estonia Fears Cyber Attacks Will Rise Because Of War In Ukraine

Estonia's cyber security is a critical investment and the nation is finding ways to improve resilience & build sophisticated offensive capabilities.

2022-05-31

An Airline Brought To A Standstill By Ransomware

India's SpiceJet was forced to cancel flights over a two day period by a second ransomware attack which targeted flight scheduling.

2022-06-06

Energy Companies Unready For Lethal Cyber Attacks

Industry professionals say that complacency and a lack of adequate training in the Energy sector is placing critical infrastructure at high risk.

2022-06-13

Ransomware - Get A Step Ahead

A Global Threat: No government, large, medium or small business, or any other organisation is immune to a ransomware attack.

2022-06-09

Innovative Cyber Training

Making cyber security skills more accessible, this course provides insight into ‘everything cyber’, scheduled to fit around participants’ day jobs.

2022-06-06

Cyber Crime’s History - Part 2 - Current Social Effects

Cyber Crime is not new, originating in the 19th century, but digital technology has empowered criminals with increasingly more powerful tools.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Acumin Recruitment

Acumin Recruitment

Acumin is an internationally established Cyber Security recruitment specialist.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

Norwegian Business & Industry Security Council (NSR)

Norwegian Business & Industry Security Council (NSR)

NSR is a member organization serving the Norwegian business sector in an advisory capacity on matters relating to crime and security including cyber.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

Evidence Talks (ETL)

Evidence Talks (ETL)

A leading forensic computing authority developing unique digital forensic technologies. Tools that detect potential terrorists & criminals & used by the military, enforcement & intelligence commmunity

authUSB

authUSB

authUSB Safe Door is a tool that provides secure access to the content of USB devices that circulate in organizations.

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

Enclave Networks

Enclave Networks

Our mission is to give IT professionals a simple way to rapidly build secure connectivity between any application, computer system, device or infrastructure - regardless of the underlying network.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

Fusion Risk Management

Fusion Risk Management

Fusion Risk Management focuses on operational resilience encompassing business continuity, risk management, IT risk, and crisis and incident management.

Aegis Security

Aegis Security

Aegis Security helps clients to secure their systems against potential threats through pre-emptive measures, such as security assessments, and cutting-edge solutions to security challenges.

Strata Identity

Strata Identity

Strata is pioneering identity orchestration to unify on-premises and cloud-based authentication and access systems for consistent identity management in multi-cloud environments.

Noerr

Noerr

Noerr is one of the top European law firms with 500 professionals in Germany, Europe and the USA. We provide solutions to complex and sophisticated legal matters including cyber risks.

Emtec

Emtec

Emtec’s cyber security team provides advisory, assessment, & managed security services that help you build the cyber security policies, toolsets & best practices to elevate your cyber security posture

BBS Technology

BBS Technology

BBS Technology is a company that develops and delivers next-generation cyber security technologies worldwide.