News

2020-06-23

Some Employees Think They Can Dodge Cyber Security

The serious damage data breaches cause is encouraging businesses to re-examine their cybersecurity and to change employee behaviour.

2020-06-22

Is AI A Benefit Or A Potential Threat?

As Artificial Intelligence grows more sophisticated, concerns about the challenges its widespread use presents to humans are growing.

2020-06-22

Twitter Is Trying To Control Propaganda

Twitter has removed tens of thousands of "state linked" accounts used by China, Russia and Turkey to promote fake news.

2020-06-22

Cyber Threats Are The Top Insurance Risk

Cyber crime is a leading threat to business and the Insurance industry is now focused on the potentially huge losses arising from ransomware.

2020-06-22

Inside The Deep & The Dark Web

The Deep Web and the Dark Web are inaccessible and widely misunderstood - they are not the same thing. What is really going on there?

2020-06-19

The Future Of Ransomware Is In The Cloud

Ransomware has become a multibillion dollar industry for cyber criminals, who are staring to focus on the fast-growing Cloud computing sector.

2020-06-18

Blame The Boss For Cyber Attacks

More than a third of British consumers would see a business leader as personally responsible if that business were to suffer a data breach.

2020-06-17

Hackers Are Targeting Coronavirus Research

State-backed cyber attackers are trying to steal data from universities and research institutes involved in coronavirus vaccine research.

2020-06-17

Your Phone Is Spying On You

Forget about the privacy of Coronavirus tracing Apps. Your new mobile phone comes straight from the factory with pre-installed spyware ready to go.

2020-06-17

Maritime Cyber Attacks Quadruple

Ageing shipping infrastructure, complex supply chains and the effects of lockdown combine to make the shipping industry highly vulnerable.

2020-06-17

Managing Your Cyber Security, Detection & Response

Data has become a new currency and managing detection and response to IT systems threats is now critical for non-technical senior managers.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

Cyber Defense Media Group (CDMG)

Cyber Defense Media Group (CDMG)

CDMG is the leading global media group for all things cyber defense.

OIC-CERT

OIC-CERT

OIC-CERT is the Computer Emergency Response Team for Organisation of Islamic Cooperation (OIC) member countries.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

TrustInSoft

TrustInSoft

TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors.

Achtwerk

Achtwerk

Achtwerk manufacture the security appliance IRMA for critical infrastructures and networked automation in production plants.

Jeffer Mangels Butler & Mitchell LLP (JMBM)

Jeffer Mangels Butler & Mitchell LLP (JMBM)

JMBM is a full service law firm providing counseling and litigation services in a wide range of areas including cyber security.

Maticmind

Maticmind

Maticmind is an ICT System Integrator providing solutions and specialized skills in Networking, Security, Unified Communications & Collaboration, Datacenter & Cloud and Application.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions Corp. is a North American IT solution provider delivering advanced analytics, cloud, cybersecurity, and managed services solutions.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

ESC - Enterprise Security Center

ESC - Enterprise Security Center

ESC is a system house specializing exclusively in IT security - Security Implementation & Optimization, Operations, Managed Security Services.

Kivera

Kivera

Kivera enforces your organisation governance and security policies across cloud deployments preventing misconfigurations turning into attack vectors.

Sinergi Digital

Sinergi Digital

Sinergi Digital is a business unit of the Metrodata Group with a focus on providing ICT solution to help accelerating digital transformation.

Lupasafe

Lupasafe

Lupasafe is an all-in-one cybersecurity platform for MSPs and SMEs. See all your cyber risks: From training to phishing, darkweb scans, continuous tech monitoring, AI insights, reporting & compliance.

CyberHive

CyberHive

CyberHive offer a complete suite of threat protection modules that seamlessly integrate to block current, as well as future threats.