News

2021-04-10

Cybersecurity Mergers And Acquisitions Q1 2021

Upward trend: A summary of cybersecurity company mergers and acquisitions activity reported during the first quarter of 2021.

2021-04-09

The Future Of Blockchain In Cyber Security

Blockchain technologies are the culmination of decades of research into cryptography and have an inherent connection to cyber security.

2021-04-09

Credentials Phishing Attacks

Attackers are adapting and have some new tactics to serve up credential phishing pages as way to bypass existing Office365 detection measures.

2021-04-09

Half A Billion LinkedIn Members Found For Sale

LinkedIn Sliced Open: IDs, names and email addresses comprise a massive archive of stolen data, placing 500 million LinkedIn users at risk.

2021-04-07

FatFace Pays $2million Ransom To Cyber Criminals

Mugged: Criminals agreed to discount their ransom to save the victim from bankruptcy. Then they offered their advice on better cyber security.

2021-04-07

Twenty Cyber Security Startups To Watch

Cybersecurity startups have raised $1.9B to date and are on track to raise a total $7.6B from investors in 2021. Here are the eye-catchers.

2021-04-06

Cybersecurity For Financial Services: Latest Trends For Fraud Prevention

Financial services companies need to anticipate and prevent fraud by unearthing and fixing loopholes faster than the bad guys. By David Lukić

2021-04-06

Over 500m Facebook Users' Data Posted On A Hacking Website

The personal information of about half a billion Facebook users, including their phone numbers, have been posted to a website used by hackers.

2021-04-06

The Satanic Mills of the Fourth Industrial Revolution

America has a huge role to play in the Fourth Industrial Revolution, if it is smart enough and disciplined enough to embrace it. By Ronald Marks

2021-04-05

Your Employee's Cyber Awareness Is Critical

Organisations need a culture of data security and employees are the caretakers of their own organisation’s most valuable and sensitive data.

2021-04-05

The European Union Adopts A Cyber Security Strategy

An agreed EU framework to defend businesses, organisations and citizens from cyber attacks and to promote secure information systems.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

AON

AON

Aon is a leading global provider of risk management (including cyber), insurance and reinsurance brokerage, human resources solutions and outsourcing services.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

Australian Signals Directorate (ASD)

Australian Signals Directorate (ASD)

The Australian Signals Directorate is an intelligence agency in the Australian Government Department of Defence.

Granite Partners

Granite Partners

Granite is a cloud service for the development of business risk management, cyber security and privacy and occupational safety and health.

GE Digital

GE Digital

GE Digital is a leading software company for the Industrial Internet. Products include Industrial Cyber Security for Operational Technology (OT).

Rhebo

Rhebo

Rhebo Industrial Protector monitors and ensures the continuous, correct, and predictable operation of real-time Industrial Control Systems to prevent outages and reduce downtimes.

SKOUT Secure Intelligence

SKOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

GovCERT Austria

GovCERT Austria

GovCERT Austria is the Austrian Government Computer Emergency Response Team. Its constituency consists of Austria's public administration.

oneclick

oneclick

oneclick is a central access and distribution platform in the cloud, enabling the management of the entire technology stack for application provisioning.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

Infinavate

Infinavate

Infinavate Fort CyberVault offers end-to-end services that comprehensively responds to the organization’s information security and privacy needs.

Simpson Associates

Simpson Associates

Simpson Associates is a Data Transformation and managed services provider that helps organisations gain valuable insights from their data and make better-informed decisions.

Trofi Security

Trofi Security

Trofi Security provides Information Technology and Information Security services to organizations in both the public and private sectors.

Open Cybersecurity Alliance (OCA)

Open Cybersecurity Alliance (OCA)

OCA is building an open ecosystems where cybersecurity products interoperate without the need for customized integrations. We're making standards-based interoperable cybersecurity a reality.