FREE TO VIEW


« Back to News

2023-08-10

Twenty Million Scam Emails Reported In Britain

Almost 21 million reports have been made to the Suspicious Email Reporting Service . resulting in the removal of over 235,000 malicious websites.

2023-06-29

British Universities Vulnerable To Credentials Fraud

Two Million Breached Credentials: British universities are at high risk of cyber security breaches caused by attacks launched using stolen identities.

2023-08-07

Email Impersonation Attacks Reach All-Time High

Email impersonation comprises over 90% of threats observed in corporate inboxes and almost all of those are credentials-based theft attacks.

2023-08-08

Only Half Of Citizens Are Happy With Digital Public Services

People are used to the convenience of e-commerce interactions and expect the same service levels in their interactions with government.

2023-06-27

USA & Europe Undergoing A Wave Of Cyber Attacks

ClOP: Russia has launched a stream of hacking exploits targeting European and numerous US government agencies & other organisations.

2023-06-26

Don't Use ChatGPT At Work

Endangering The Organisation: There are numerous potential hazards for staff & employers connected with using ChatGPT in the workplace.

2023-06-26

Why Are Businesses Ignoring Incident Response?

Not having an Incident Response Plan can be a significant factor in how much impact an attack has and how long it takes to recover. By Phil Robinson

2023-06-22

Progress Software Has Critical Hacking Vulnerabilities

MOVEit: CISA has identified that another software product has been exploited to breach multiple US federal agencies by “unattributed APT actors”.

2023-06-22

What Is The Cybersecurity Maturity Model Certification (CMMC)?

CMMC certification can give your business a competitive edge in the defense contracting marketplace as well as help safeguard national security.

2023-06-21

Maritime Cyber Attacks Are A Deadly Threat

Collisions, Deaths & Disruption: Maritime cyber security needs more investment, better regulation and widespread sharing of threat intelligence.

2023-06-21

Data Sovereignty

Cyber security is not just about IT, it is about data governance and the responsibility for that rests firmly with management. By Simon Pamplin

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

Zertificon Solutions

Zertificon Solutions

Zertificon is a leader in professional email encryption and data security.

Mega

Mega

Mega is a secure cloud data storage provider with browser-based high-performance end-to-end encryption.

CSIRT Malta

CSIRT Malta

CSIRT Malta supports critical infrastructure organisations in Malta on how to protect their information infrastructure assets and systems from cyber threats and incidents.

Korea Internet & Security Agency (KISA)

Korea Internet & Security Agency (KISA)

KISA is committed to improving the competitiveness, reliability and security of Internet information and knowledge in Korea.

Industrial Cyber Security

Industrial Cyber Security

Industrial Cyber Security provides specialist consulting services in enterprise and SCADA system security.

Synack

Synack

Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners.

AdaptiveMobile Security

AdaptiveMobile Security

AdaptiveMobile Security, a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

CyGlass

CyGlass

CyGlass simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people.

Presidio

Presidio

Presidio is a leading North American IT solutions provider focused on Digital Infrastructure, Business Analytics, Cloud, Security & Emerging solutions.

Iterasec

Iterasec

Iterasec provides a full range of security services to hacker-proof your products and make software engineering process secure by design.

TachTech

TachTech

TachTech is passionate about trust, security and privacy in the digital world. We create tailored security and compliance solutions to improve your business.

Geobridge

Geobridge

Geobridge was one of the first information security solutions providers to support cryptography and payment applications for payment processors, financial institutions and retail organizations.

OpenAI

OpenAI

OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.

Clumio

Clumio

Clumio provides autonomous backup and recovery for critical cloud data.