News

2022-05-16

Investment Scams Are Increasing

Britain's financial regulator is warning people to beware of fake financial advisers offering investment schemes via online meeting platforms.

2022-05-16

Threat Hunting Solutions

It's crucial for organizations to utilize proactive cyber threat hunting in building, securing and maintaining their security infrastructure.

2022-05-16

Costa Rica Declares A State Of Emergency Following Cyber Attacks

The Conti cyber crime group are holding the government of Costa Rica to ransom in a wide -ranging attack that has knocked state agencies offline.

2022-05-13

Wanted: Access To Social Media Data

Despite its enormous influence and large scale manipulation by malicious actors, Social Media remains opaque and resistant to detailed analysis.

2022-05-13

Some Apps Come Loaded With Malware

App stores share a common threat profile. Apps loaded with malware present the most immediate risk to millions of unsuspecting users.

2022-05-10

The Cyber Security Investment Boom Continues

M&A activity grew to over $70 billion in 2021and reached almost $27 billion by the end Q1 2022, but there are signs investors are getting cautious.

2022-05-10

Special Measures To Deal With Quantum Technology

The US wants to speed up the domestic development of quantum technology, whilst adddressing the risks it presents to secure communications.

2022-05-09

Anonymous Launch An Attack On Rosneft

The hacking collective Anonymous claim they have stolen 20 Terabytes of data from a major Russian oil company, knocking its systems offline.

2022-05-09

India Issues A Directive For Reporting Cyber Incidents

The Indian government has issued a directive requiring organisations to report cyber security incidents to CERT-IN within six hours of their discovery.

2022-05-09

A History Of Cyber Security

Understanding the history of cyber security may help shed some light on how to take effective steps to keep Internet users safe today.

2022-05-09

Only 3% Of Cyber Security Startups Are Led By Women

A new report finds that of the 654 startups that raised more than $1,000,000 in funding in 2020 and 2021, only 22 were led by female CEOs.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Evidence Talks (ETL)

Evidence Talks (ETL)

A leading forensic computing authority developing unique digital forensic technologies. Tools that detect potential terrorists & criminals & used by the military, enforcement & intelligence commmunity

LEPL Cyber ​​Security Bureau - Georgia

LEPL Cyber ​​Security Bureau - Georgia

The aim of the LEPL Cyber Security Bureau is to create and strengthen stable, efficient and secure systems of information and communications technologies.

Quantea

Quantea

Our multi-patented solutions - QP Series Network Analytics Accelerator appliance and PureInsight Analytics Software Suite allows you to capture, analyze, store, replay, network traffic data.

CyberSwarm

CyberSwarm

CyberSwarm is developing a neuromorphic System-on-a-Chip dedicated to cybersecurity which helps organizations secure communication between connected devices and protect critical business assets.

Aurora Systems Consulting

Aurora Systems Consulting

Aurora is a Cybersecurity solutions provider with a portfolio consisting of security consulting, products and services that proactively prevent, secure and manage advanced threats and malware.

Cyber Protection Group (CPG)

Cyber Protection Group (CPG)

Cyber protection Group specialize in Penetration Testing. We work with enterprise level companies as well as small to medium sized businesses.

FourthRev

FourthRev

FourthRev is an education-technology start-up with a mission to solve the skills crisis of the Fourth Industrial Revolution.

Ghost Security

Ghost Security

Ghost is a venture backed, product-led startup building the new standard in application security for the modern enterprise.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

Systal Technology Solutions

Systal Technology Solutions

Systal is a global managed network and security service and transformation specialist. We help enterprise-level businesses maximise the security and business value of their complex IT infrastructure.

Fairly AI

Fairly AI

Fairly AI is on a mission to democratize safe, secure, and compliant AI across the enterprise.

HYCU

HYCU

HYCU was born of the need to simplify data protection and provide equivalent levels of backup and recovery support across on premises, public cloud, and SaaS workloads.

Tyto Athene

Tyto Athene

At Tyto Athene, we harness the power of technology to provide solutions that shape the future.

Blind Insight

Blind Insight

Field-level searchable encryption plus fine-grained programmable access controls. All wrapped neatly in developer-friendly APIs and SDKs. Data protection perfection.

Shepherd

Shepherd

Shepherd's mission is to empower IT teams with solutions that simplify endpoint management, enhance security, and adapt to the evolving complexities of modern work environments.