News

2024-02-16

British Police, AI & The Fight Against Cyber Crime 

The fraud and cybercrime landscape is going to be profoundly transformed by AI. A top British Police officer answers some key questions.

2024-02-14

Build an Effective Endpoint Detection and Response Strategy

Ready To Simplify Your Endpoint Security? Discover how you can safeguard your AWS environment with tools available in AWS Marketplace.

2024-02-14

Flight App Vulnerability Could Enable Skyjacking

Hackers Could Hijack Flights: In an increasingly technology-focused world, aviation security is becoming a critical problem. 

2024-03-04

Prioritising Data Privacy & Security

The Most Valuable Assets: Every piece of information holds value and must be shielded from prying eyes and malicious intent. By Jacques du Preez

2024-02-09

Facebook Changed the World

Global Social Impact: By monetising its users' personal data, Facebook proved that collecting our likes and dislikes is extremely lucrative.

2024-02-13

Outsourcing Production Risks Productivity

An IT department often needs to find a quick solution when a large number of users are impacted by an operational emergency. By Matt Lorentzen

2024-02-13

The US Makes Robocalls Illegal

With major national elections pending in the major democracies around the world, the US FCC regulator has outlawed AI-generated phone calls.

2024-02-13

Chinese Hackers Operated Undetected In Critical US Networks

The Chinese state-sponsored hacking group Volt Typhoon has been embedded in critical US infrastructure networks for at least five years.

2024-02-13

DDoS Attacks In Poland Have Spiked As New Government Takes Office

Damaging Hacktivist Activity: Politically motivated DDoS attacks on public services across several critical sectors have spiked following elections.

2024-02-12

Imran Khan Claims Victory Using AI Generated Video

Pakistan Election Turmoil: The imprisoned political leader appeared on an AI generated video to claim virtual victory following an Internet shutdown.

2024-02-12

Static Application Security Testing: Trends & Predictions For 2024

SAST: Finding security vulnerabilities in source code early in the development lifecycle, makes it easier and cheaper to fix any issues.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

SABSACourses

SABSACourses

SABSA is a development process used for solving complex problems such as IT Operations, Risk Management, Compliance & Audit functions.

Kaspersky Lab

Kaspersky Lab

Kaspersky Lab is one of the world’s largest privately held vendors of endpoint cybersecurity solutions.

Guardea Cyberdefense

Guardea Cyberdefense

Guardea Cyberdefense is an IT services company specializing in the management of security projects, with a pool of skills selected from a network of specialized partners.

VisionWare

VisionWare

VisionWare provide consulting services and solutions in areas covering both physical and digital security.

Hypori

Hypori

Hypori is a virtual smartphone solution that makes truly secure BYOD a reality for organizations in healthcare, finance, government, and beyond.

Enosys Solutions

Enosys Solutions

Enosys Solutions is an IT security specialist with a skilled professional services team and 24x7 security operations centre servicing corporate and public sector organisations across Australia.

Berwick Partners

Berwick Partners

Berwick Partners’ Cyber Security Practice is a leading recruiter of senior management positions in this field; we have an exceptional understanding of the constantly changing Cyber landscape.

Global Cyber Alliance (GCA)

Global Cyber Alliance (GCA)

Global Cyber Alliance is an international, cross-sector effort dedicated to eradicating cyber risk and improving our connected world.

Digital Security

Digital Security

Digital Security is an Ecuadorian company specialized in providing comprehensive information security solutions.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

Zercurity

Zercurity

Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats.

Protected Media

Protected Media

Protected Media’s advanced cybersecurity ad fraud solution guards you against current and emerging threats across Connected TV, Display and Video advertising.

MVP Tech

MVP Tech

MVP Tech designs and deploys next generation infrastructures where Security and Technology converge.

SafePaas

SafePaas

SafePaas is a leading Enterprise Risk Management Platform. One source of truth for all your Audit, Risk, and Compliance requirements. Complete governance across your systems.

Protega

Protega

Protega is a company specialized in Managed Cybersecurity Services (MSS) & SOC 24×7; management, risk & compliance (GRC); implementation of data protection technologies; and Red Team services.