News

2024-02-05

The Data Privacy Risks Of Generative AI

Many organisations are implementing a ban on the use of Gen-AI in the workplace, due to widespread growing concerns over privacy & data security.

2024-01-31

Lush Employee Data Stolen

Passport Scans: The Akira ransom gang claims to have stolen 110 GB of critical employee data from the international cosmetics business.

2024-02-02

Russia Affected By Mysterious Nationwide Internet Outage

DNS Error: Websites on the national .ru domain, the Yandex search engine, the Kontakte social media platform and a major bank all offline.

2024-02-02

Fast Forward - Technology Developments By 2040

Expert futurists forecast how rapid technology changes may shape our world over the next 15 years. Both AI and misinformation will be significant.

2024-02-02

Reducing The Risk Of Weak Links With Consolidation

Less Complexity, Less Risk: Cyber security measures are only as strong as the weakest link and consolidation is a smart move. By Manuel Sanchez

2024-01-31

The Importance Of Cloud Access Security In Today's Cyber Landscape

Cloud Access Security Broker solutions provide organizations with the necessary tools and capabilities to secure their cloud environments.

2024-01-31

Quantum Computing: The Growing Threat Of SNDL

Store Now & Decrypt Later: Advances in Quantum computing mean that any encrypted data that's already been stolen can no longer be protected.

2024-01-31

FinOps In Cybersecurity: Managing The Cost Of Security

FinOps is all about understanding the cost implications of different security measures & making informed decisions about where to allocate resources.

2024-01-30

AI Adoption: The Overlooked Existential Risk

Despite many fears, Generative A is being safely deployed across many sectors and will drive enormous long term value. By Adrian Joseph

2024-01-30

Britain's New Digital Markets Act Could Cost Business Billions

The updated Digital Markets Bill, intended to ensure fairer competition in the technology industry, may impose heavy costs on business & consumers.

2024-01-30

What Lessons Have We Learnt From Recent Ransomware Group Attacks?

No Room For Laxity: Whilst regulatory fines are computable, reputational loss and its longevity are impossible to quantify. By Jack Garnsey

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

HackLabs

HackLabs

HackLabs is a penetration testing company providing services for network security, web application security and social engineering testing.

Authenware

Authenware

AuthenWare delivers the highest level of identity security based on behavioral biometrics.

Tukan IT

Tukan IT

Tukan IT provides a data classification and protection solution.

Nuvias Group

Nuvias Group

Nuvias Group is a specialist value-addedd IT distribution company offering a service-led and solution-rich proposition ready for the new world of technology supply.

The Open Group

The Open Group

The Open Group: Leading the development of open, vendor-neutral IT standards and certifications.

miniOrange

miniOrange

miniOrange is a cloud and on-premise based identity and access management (IAM) solution provider.

IBA Security

IBA Security

IBA Security is a center of competence consolidating the cybersecurity expertise of the IBA Group.

VS Security Products

VS Security Products

VS Security Products design, manufacture and sell the most extensive range of degaussers and data destroyers on the market, suitable for all types of magnetic media.

Security BSides

Security BSides

Security BSides is the first grass roots, DIY, open security conference in the world!. BSides is a community-driven framework for building events for and by information security community members.

OISTE Foundation

OISTE Foundation

OISTE foundation allows users to control their digital identities using well-understood and secure algorithms that ensure the continued validity of an identity and its claims.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

BCN Group

BCN Group

BCN Group is an agile IT solutions provider. We are experts in delivering and managing business-critical technology solutions.

Etisalat and (e&)

Etisalat and (e&)

Etisalat Group is one of the world’s leading telecom groups in emerging markets.

Amiosec

Amiosec

Amiosec is a British cyber innovation business specialising in delivering simple-to-use solutions to the complex problems of the modern world.

CyRiSo

CyRiSo

CyRiSo is a cyber security consulting company with a focus on 'as-a-service' services for the most pressing challenges of cyber security.