News

2020-08-04

China's Surveillance State Extends Beyond Its Borders

The Chinese state is widely using technology not only to track its own citizens, but to exert power beyond its borders by espionage and theft.

2020-08-04

Secret Brexit Documents Hacked By Russians

Russian hackers stole classified documents relating to US / UK post-Brexit trade talks, which were then used in the 2019 General Election.

2020-08-03

Reducing Exposure To Cyber Attack

Strengthening your organisation's defences is about reducing the attack surface and eliminating insider errors, making it much harder to break in.

2020-08-03

European Union Sanctions Cyber Attackers

The EU imposes sanctions on targeted individuals and entities from Russia, China and North Korea in a sign that it is taking cyber warfare seriously.

2020-08-03

Hackers Breach Cisco Security Network

Cisco reveals a high-severity flaw in its network security software allowing remote, unauthenticated attackers to access sensitive data.

2020-08-03

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Understanding adversary tactics & techniques based on real-world observations are critical to building effective threat detection capabilities.

2020-07-31

#BLM Targeted By Racist Cyber Attacks

Black Lives Matter is at the centre of a national conversation about race, racism, and policing, making it a special target for hackers and trolls.

2020-07-31

The Costs Of A Data Breach

The total cost of a data breach to a major business has reached a whopping $3.9m. It's not just money - reputation, credibility and trust are at stake.

2020-07-30

Women In Cyber Security Are Paid Much Less Than Men

There is still a shortage of women in the global cyber security workforce - not least because they are paid 21% less than men doing the same job.

2020-07-30

Hollywood Site Leaks Personal Data Of 260,000 Actors

The information exposed includes full profiles of over 260,000 users along with very sensitive personal information and access to photographs.

2020-07-29

Vital Necessity Of Cloud Computing Highlights Security Risks

Orca Security's research finds that public cloud environments are rife with neglected workloads, authentication issues and lateral movement risk.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CyberPoint

CyberPoint

CyberPoint delivers innovative, leading-edge cyber security products, solutions, and services to customers worldwide.

CloudOak

CloudOak

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

Tech-Recycle

Tech-Recycle

Tech-Recycle was formed to help companies and individuals securely, ethically and easily recycle their IT and office equipment. We destroy all data passed to us safely and securely.

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

Injazat

Injazat

Injazat Data Systems is an industry recognized market leader in the Gulf region for Information Technology, Data Center and Managed Services.

Blue Lance

Blue Lance

Blue Lance is a global provider of cybersecurity governance solutions. Our software solutions automatically collect and store the information necessary for investigations, audit and compliance.

RocketCyber

RocketCyber

RocketCyber is a Managed SOC platform empowering Managed Service Providers (MSPs) to deliver security services to small and medium businesses.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

Cyber Resilience Centre for Wales (WCRC)

Cyber Resilience Centre for Wales (WCRC)

The Cyber Resilience Centre for Wales (WCRC) is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Salem Cyber

Salem Cyber

Salem Cyber builds Artificial Intelligence (AI) solutions that work collaboratively with people to address scalability challenges in cybersecurity operations.

CyberXpert

CyberXpert

CyberXpert is your cybersecurity partner for the public and private sector in Belgium.

DHCO IT

DHCO IT

The DHCO IT team are experts in IT support, cyber security, cloud support and disaster recovery, and are Microsoft 365 partners.

Layer 8 Security

Layer 8 Security

Layer 8 Security is a cybersecurity advisory, consulting, and technical services firm that arms businesses with practical compliance, risk management, and security program strategies.

TrustNet

TrustNet

TrustNet helps mid-to-large firms build trust through top-tier cybersecurity, compliance, and consulting—offering complete managed services all in one place.