News

2020-09-29

Chinese Hackers Spying On US Government Agencies

Chinese hackers are exploiting known software flaws in commercial technologies and open-source tools to target US government and businesses.

2020-09-29

Artificial Intelligence Is The Future Of Security

Using AI and ML to combat malware and phishing attacks can help security teams focus on understanding the growing volume of threats.

2020-09-29

Social Media Campaigns Designed To Disrupt US Election

Facebook and Twitter say that a Kremlin-backed organisation that interfered in the 2016 election is once again targeting American voters.

2020-10-07

Foreign Hackers Threaten US Election Security

Foreign actors may create or alter websites and create fake news that discredits the US electoral process and undermines voters' confidence.

2020-10-01

Is Slack Secure For Your Business?

Slack is a popular productivity tool used as a communal discussion platform for many business employees. But is it really secure?

2020-10-07

Improving SME Cyber Security

SMEs have become a preferred target for cybercrime because many lack the time, budget and expertise to put security defences in place.

2020-10-09

Remote Working Compromises Outbound Email

Most IT leaders believe remote working greatly increases the risk of sensitive data being placed at risk from outbound email data breaches.

2020-10-02

Too Many Employees Use Their Own Devices To Access Corporate Data

BYOD: Nearly half of employees are using their own devices to access data which belongs to their company - that's risky behaviour.

2020-10-06

Cyber Warfare Creates Ghosts In Our Machines

Cyber weapons are accessible to anyone with the right computer expertise, not just governments. This changes the nature of armed conflict.

2020-10-07

Australia Wants Google & Facebook To Pay For News

As Big Tech resists calls for greater regulation, Australia will compel Google and Facebook to pay for news content provided by media publishers.

2020-10-09

Iranian Government Hackers Spy On Dissidents

An Iranian hacker group has spied on Iran’s government political opponents for years by exploiting stolen 2 Factor Authentication codes.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CyberSource

CyberSource

CyberSource provides online payment and fraud management services for medium and large-sized merchants.

RiskLens

RiskLens

RiskLens is a software company that specializes in the quantification of cybersecurity risk.

MSG Systems

MSG Systems

MSG are committed to intelligent IT and industry solutions and offer independent consulting on all aspects of information security.

ISGroup (Information Security Group)

ISGroup (Information Security Group)

ISGroup services include network penetration testing, Web application penetration testing, ethical hacking, vulnerability assessments, code review and associated training.

Regulus Cyber

Regulus Cyber

Regulus enables drones, robots and autonomous vehicles to operate safely, without malicious or accidental interference to the operation of their mission.

VS Security Products

VS Security Products

VS Security Products design, manufacture and sell the most extensive range of degaussers and data destroyers on the market, suitable for all types of magnetic media.

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

vCISO Services

vCISO Services

vCISO Services is a small, specialized, veteran-owned firm focused on the needs of SMBs only.

XpertDPO

XpertDPO

XpertDPO provides data security, governance, risk and compliance, GDPR and ISO consultancy to public and private sector organisations.

Finite State

Finite State

Finite State enables product security teams to protect the devices we rely on every day through market-leading software threat, vulnerability, and risk management.

Corinium Global Intelligence

Corinium Global Intelligence

At Corinium, we have been bringing together the brightest minds in data, AI and info sec since 2013, to innovate at the intersection of technological advancements and critical thinking.

Auria

Auria

Auria advances complex space, missile, and cyber operations with visionary solutions and software.

Dev Information Technology (DEV IT)

Dev Information Technology (DEV IT)

DEV IT is a leading IT solutions and services company. We deliver digital transformation and end-to-end IT services, from advisory to execution.

ThingsRecon

ThingsRecon

ThingsRecon empowers organisations to continuously map and manage their attack surface, uncover hidden vulnerabilities, and assess supplier cyber hygiene.