News

2021-05-06

Top Five Most Common Gaps In Businesses’ Cyber Security

Embedding cyber security into your operations takes everyone in the organisation to understand and accept their responsibility. By Victor Lough

2021-05-05

Your Organisation Needs A Cyber Audit

Cyber threats evolve at breakneck speed and it’s important to continually ensure that your cyber security measures are effective and up to date.

2021-05-05

The Cyber Security Paradigm Is Changing

Traditional cyber security, with hard external boundaries, is being undermined by pressure for more operational flexibility and developments in IT.

2021-05-04

Managing Cyber Security As Office Work Resumes

Cyber security and compliance teams must begin the return-to-office planning process so that when employees arrive, everyone is prepared.

2021-05-04

Dark Web Drug Dealers Jailed

Two drug dealers who made $4.8 million from their dark web drugs operation got so many clients that they used an automated “bot” to run the business.

2021-05-04

World Password Day - 6th May

World Password Day exists to spread the awareness that taking care of your passwords is vital to protecting yourself against identity theft.

2021-05-04

Risks Of Bias In ‘Emotional AI’

Facial recognition mass surveillance software used to scan crowds to detect doubt and anger as emotions that indicate potential threats, is not safe.

2021-04-30

Hackers Threaten To Publish Police Informant Data

Washington DC police is "aware of unauthorised access on our server" and has received a ransom demand threatening to name their informants.

2021-05-03

Facebook And Apple Clash

A new feature is being introduced to iPhones and iPads which is causing a serious disagreement between Apple and Facebook over user privacy.

2021-05-02

Darktrace Share Price Jumps

In an exceptional example of a female-led technology company going public, Darktrace has achieved a valuation in excess of £2 billion.

2021-04-30

Is Ethical Hacking A Business Necessity In 2021?

Businesses want to improve their cybersecurity - training, stronger systems & software. But how about using ethical hackers? By Chester Avey

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cybsecurity Foundation (CSF)

Cybsecurity Foundation (CSF)

Cybsecurity is a non-profit NGO, which aims to work on improvement of security levels in the Polish cyberspace.

Panda Security

Panda Security

Panda Security specializes in the development of endpoint security products and is part of the WatchGuard portfolio of IT security solutions.

IT GRC Forum

IT GRC Forum

The IT GRC Forum is an online resource and networking platform for the Governance, Risk Management, and Compliance (GRC) community

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

EY Advisory

EY Advisory

EY is a multinational professional services firm headquartered in the UK. EY Advisory service areas include Cybersecurity.

Samsung Knox

Samsung Knox

Samsung Knox brings multi-layered defence-grade security to your business’s smartphones and tablets.

Labris Networks

Labris Networks

Labris Networks specializes in DDoS mitigation, NG Firewall, Unified Threat Management, Centralized Management, Regulatory Compliances and SOC/CERT Services.

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

Japan Cybersecurity Innovation Committee (JCIC)

Japan Cybersecurity Innovation Committee (JCIC)

JCIC is an independent and not-for-profit thinktank to establish a secure and safe digital society.

Cryptika

Cryptika

Cryptika is a fully integrated IT security and managed services provider, specialized in Next-Generation Cyber Security Technologies.

Qohash

Qohash

With a focus on data security, Qohash supports security, compliance and optimization use cases enhancing your risk management process.

Troye Computer Systems

Troye Computer Systems

Troye provide a complete range of digital workspace solutions that empower people to do their very best work in a safe and secure manner anywhere, anytime, using any device.

Dexian

Dexian

Dexian is a leading provider of staffing, IT, and workforce solutions with nearly 12,000 employees and 70 locations worldwide.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.

Quantum Bridge

Quantum Bridge

Our unbreakable key distribution technology ensures the highest level of protection for your critical infrastructure and sensitive data in an evolving digital landscape.

Staris

Staris

Human based defense is dead. Staris is reinventing application security for an increasingly AI driven world.