FREE TO VIEW


« Back to News

2023-06-20

Improving Data Security To Ensure Cybersecurity Compliance

NIS 2 Directive: Companies affected by the new directive need to demonstrate the highest levels of cybersecurity compliance. By John Michael

2023-06-20

Manufacturers Are Today's Top Target For Cyber Crime 

Security By Default: Manufacturing products & services need to implement layers of resilience to their different types of threat. By Andy Dunn

2023-06-20

Shuckworm Intensifies Cyber Attacks On Ukraine

Shuckworm is thought to be linked to the Russian FSB and has increased cyber attacks on Ukraine, hacking military & security intelligence. 

2023-06-19

Is It Possible To Trust AI Decision-Making In Cybersecurity?

AI's Use In Cybersecurity Is Still Evolving: How will this impact decision-making and can the results of its use be trusted? By Iam Waqas

2023-06-14

Nine Types of Modern Network Security Solutions

Multiple Technologies & Policies: As reliance on digital technology & data intensifies, guaranteeing effective network security is imperative.

2023-06-19

Penetration Testing Is A Vital Tool To Deal With AI-Based Attacks 

Penetration testing can indicate the best ways to defend, remediate & recover from the threat of AI-inspired and AI-powered attacks. By Ed Skoudis

2023-06-19

Mobile Authentication: The Good, The Bad & The Ugly

Mobile authentication is convenient to use and offers a sense of security, but this type of device isn’t as secure as it may seem. By Mark Bell

2023-06-19

Five Biggest Dangers Of AI For The Upcoming Years

While talking about the potential applications and benefits of artificial intelligence, it’s also important to address the dark side of the moon. 

2023-06-19

US Government Agencies Attacked By Russian Criminals

Update: Clop Ransom Campaign Spreads Across US: Johns Hopkins & Georgia universities, plus federal agencies hit by MOVEit vulnerability.

2023-06-15

Analysing XeGroup’s Arsenal Of Cyberattack Methods

Highly Evasive Adaptive Threat Techniques: A new class of cyber threats that evade the usual range of protective tools & analysis. By Brett Raybould

2023-06-15

Year in Review: Biggest Application Security Breaches Of 2022

As cyber threats become more sophisticated, it is crucial for organizations to stay vigilant and take all necessary steps to prevent data breaches.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

PubNub

PubNub

PubNub enables developers to build secure realtime Mobile, Web, and IoT Apps.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

EverC

EverC

EverC (formerly EverCompliant) is a leading provider of cyber intelligence that allows acquiring banks and payment service providers (PSP) to manage cyber risk.

Fidus Information Security

Fidus Information Security

Fidus is a team of security professionals providing Penetration Testing and Cyber Security Consulting services throughout the UK and worldwide.

CyberForce Program - US Department of Energy

CyberForce Program - US Department of Energy

The Department of Energy’s (DOE) CyberForce Program is a workforce development program that seeks to inspire and develop the next generation of cyber defenders for the energy sector.

Infopulse

Infopulse

Infopulse is a global provider of Software Engineering, Cloud & IT Infrastructure Management, and Cybersecurity services.

Area 1 Security

Area 1 Security

Area 1 is the only Pay-per-Phish solution in cyber security. And the only technology that blocks phishing attacks before they damage your business.

Carve Systems

Carve Systems

Carve Systems was founded to bring enterprise level information security, training, and risk management services to organizations of any size and industry.

Arcanna.ai

Arcanna.ai

Using a wide range of out-of-the box integrations, Arcanna.ai continuously learns from existing enterprise cybersecurity experts and scales your team’s capacity to deal with threats.

Extreme Networks

Extreme Networks

Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure.

Kirk ISS

Kirk ISS

Kirk ISS are the leading provider of IT services in the Cayman Islands. We offer best-in class hardware, software, communications and cloud computing, all backed by professional services support.

Obsidian Security

Obsidian Security

Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS.

Imprivata

Imprivata

Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges.

Red Helix

Red Helix

Red Helix (formerly Phoenix Datacom) is a market leader in network performance and cyber security.

Boston Government Services (BGS)

Boston Government Services (BGS)

Boston Government Services is an engineering, technology, and security firm providing mission-focused solutions for the clean energy, nuclear, and federal programs markets.

X-PHY

X-PHY

X-PHY is a pioneering cybersecurity company dedicated to hardware-based cybersecurity solutions that protect data at its core.