News

2020-04-16

Pandemic Prevention Using Blockchain

Blockchain is increasingly being considered as a potentially powerful tool to assist with critical aspects of containing the coronavirus outbreak.

2020-04-15

APT Hackers Turn On China

DarkHotel: Powerful hackers are engaged in an intense espionage campaign against Chinese government agencies grappling with COVID-19.

2020-04-09

No, 5G Does Not Spread Coronavirus

Conspiracy theories over a link between the roll out of 5G and the spread of coronavirus have been spreading through social media networks.

2020-04-15

Japan's New AI-Based Cyber Defence System

Japan's military plans an AI-powered defence system to respond fast to attacks on infrastructure in an automated way and to neutralise their effects.

2020-04-15

5G Security: Possible Risks & Challenges

5G will be the mainstay of the future digital economy and with so much at stake network security must be flawless. By David Balaban

2020-04-14

Cyber Resilience Benchmarks - Missed

Only 17% of organisations are meeting an acceptable standard, according to the 3rd Annual Cyber Resilience Survey from Accenture Security.

2020-04-14

Experts Aim To Combat COVID-19 Cyber Attacks

CTI League: Cyber security experts worldwide have come together to combat ransomware attacks on hospitals during the coronavirus crisis.

2020-04-14

Marriott Hotels - Millions Hacked Again

Careless: After the first incident in 2018 Marriott says it has now lost personal data for as many as 5.2 million guests in a second giant breach.

2020-04-09

Spear Phishing Threats & Trends

A highly targeted form of email account crime, spear phishing is designed to trap well-researched victims and is a growing threat to business.

2020-04-13

Cyber Attacks Up 500% In A Month

Most of the world is trying to deal with the COVID-19 pandemic, but hackers are not under a lockdown as phishing and other attacks surge.

2020-04-11

Half Of UK Business Has A Critical Cyber Skills Gap

Only half of British businesses (50%) and charities (49%) say they carried out an internal or external cyber security audit in the last 12 months.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Magnet Forensics

Magnet Forensics

Magnet Forensics' family of digital forensics products are used globally by thousands of law enforcement, military, government and corporate customers.

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

AVR International

AVR International

AVR educate, advise, analyse and provide professional, technical consultancy and support to ensure your business is safe, compliant and protected.

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

DefenseStorm

DefenseStorm

DefenseStorm is a Security Data Platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective.

ERMProtect

ERMProtect

ERMProtect is a leading Information Security & Training Company that helps businesses improve their cybersecurity posture and comply with regulations.

Webtotem

Webtotem

Webtotem's mission is to prevent the global epidemic of website infection and provide every website owner with basic security rights.

Gigacycle

Gigacycle

Gigacycle is one of the leading IT disposal and recycling providers in the UK. We specialise in IT asset disposal (ITAD) and data destruction.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

FPT Software

FPT Software

As a leading technology service provider, FPT assists customers of all sizes and from any industries in implementing and adapting digital technologies including cybersecurity.

Horizon3.ai

Horizon3.ai

Horizon3.ai is a leader in security assessment and validation enabling continuous security overwatch from an attacker’s perspective through our NodeZero SaaS solution.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

LogicGate

LogicGate

The LogicGate Risk Cloud™ is an agile GRC cloud solution that combines powerful functionality with intuitive design to enhance enterprise GRC programs.

Early Game Ventures (EGV)

Early Game Ventures (EGV)

Early Game Ventures invests in startups that jumpstart new industries in the emerging markets of Europe.

12Port

12Port

12Port network security solutions help companies tackle modern cybersecurity threats cost-effectively while implementing zero-trust architectures.