News

2022-04-13

Cyber Criminals Volunteer For War In Ukraine

Hacking Groups Hit Critical Infrastructure: Anonymous in one corner and Conti in the other as cyber criminals take sides in the Ukraine conflict.

2022-04-12

Impress Your Cyber Insurance Underwriters With These Essential Tips

Cyber insurance is becoming harder to obtain. One solution is to make sure that key corporate assets are only accessible to authorised users.

2022-04-12

Finland Hit By Cyber Attacks

The Finnish Foreign and Defence ministries' websites were knocked offline & the Ministry of Defence tweeted that its website was under attack.

2022-04-11

Bank of Ireland Fined €463,000 Over Data Breaches

A series of data breaches made by the bank affected more than 50,000 customers, who were then not properly informed, as required by law.

2022-04-09

Cyber Security: GCHQ's Director Speaks Out

Britain's spy chief explains how events in Ukraine, the advance of China and COVID convinced him that national cyber security must get better.

2022-04-11

Google’s Emergency Update For Chrome

Chrome users are recommended to upgrade their browsers as soon as possible to prevent attackers exploiting a high-severity zero-day vulnerability.

2022-04-11

Russia Hacked Ukrainian Satellite Communications

The Viasat KA band satellite was hit by a sophisticated cyber attack that wiped devices on the same day that Russia's invasion of Ukraine began.

2022-04-11

Mobile Cyber Attacks: The Different Facets Of Smartphone Malware

Vulnerable Banking Apps: Behavioural biometrics is the key to overcoming the challenge of advances in mobile malware. By Gemma Staite 

2022-04-07

FOR PEN TESTING – CYRIN’s CYBER RANGE

Virtual Simulation: With CYRIN’s Cyber Range, Pen Testers have a new & exciting option to create virtual copies of a client’s network. Book A Demo

2022-04-06

Overcoming The Obstacles Caused By The Great Resignation

One in ten security professionals are looking to move elsewhere to benefit from better pay, conditions and work-life balance. By Fabien Rech

2022-04-06

The Metaverse Will Have An Impact On Privacy & Security

As augmented reality platforms develop into the Metaverse, users are going to be presented with entirely new categories of security risk.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

RiskLens

RiskLens

RiskLens is a software company that specializes in the quantification of cybersecurity risk.

Yubico

Yubico

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts.

Opscura

Opscura

Opscura (formerly Enigmedia) brings the reliable and cautious hands of operations together with the analytical minds of cyber experts and cryptography researchers.

Intensity Analytics

Intensity Analytics

Intensity Analytics is a software firm that develops next-generation, physical user and entity behavioral authentication ("physical UEBA") security software technology.

Cryptosense

Cryptosense

Cryptosense provides the first application security software dedicated to the detection and remediation of crypto vulnerabilities.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

National Digital Exploitation Centre (NDEC) - United Kingdom

National Digital Exploitation Centre (NDEC) - United Kingdom

NDEC is a project to create a centre of cyber and digital development and education for the UK. It will offer training in digital practices, cyber security and research.

Span

Span

Span designs, develops and maintains information systems based on advanced technological solutions of global IT leaders.

Cyber Covered

Cyber Covered

Cyber Covered provide complete website & data cover with market leading cyber insurance and powerful compliance software in one affordable package.

CM Blockchain Security Center

CM Blockchain Security Center

We are dedicated to building a healthier blockchain ecosystem, providing solutions to security technology, and helping those who practice in the area of blockchain to get insight into industry trends.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Responsible Cyber

Responsible Cyber

Protect yourself with Responsible Cyber’s 360° platform, IMMUNE, arming you with comprehensive support for your business.

Oman Technology Fund (OTF)

Oman Technology Fund (OTF)

Oman Technology Fund aims to make Oman the preferred destination for emerging tech companies in the region, and an attractive and stimulating destination for venture capital.

Identity Digital

Identity Digital

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities.

Velum Labs

Velum Labs

Velum Labs is a cyber intelligence company that provides simple and non-intrusive, cloud and cyber intelligence solutions; built from a market-leading understanding of cyber-attack methodology.

Computer Futures

Computer Futures

Computer Futures are a global specialist IT recruitment partner, matching candidates with roles across niche IT markets and core technologies.