FREE TO VIEW


« Back to News

2023-06-08

A House Of Cards

The Risk Of Losing User Trust: The Capita incident showcases the importance of cybersecurity in Digital Transformation. By Paul Holland

2023-06-07

Ransomware Trends In The Aviation & Maritime Industries

Transport sector organisations have a distinctive profile from an attacker’s perspective, making them an especially lucrative target.

2023-06-07

Update: BBC, British Airways & Boots In Supply Chain Attack

CLOP: Hackers found a software vulnerability to penetrate a growing number of UK firms in a major supply chain exploit. Now they want ransom.

2023-06-06

British Business Moves To Adopt Digital Identity

More than half of UK organisations either currently use digital identity or plan to soon incorporate digital identity solutions into their operations.

2023-06-05

Musk's Brain Chip Firm Gets US Approval for Human Analysis

Elon Musk's brain-chip company Neuralink has now been approved by the US Food and Drugs Administration (FDA) to conduct human tests.

2023-07-05

Advanced Phishing Attacks Tripled In 2022

Protecting Organisations Is More Important Than Ever: Hackers are using new tools to simplify & automate the process of generating attacks.

2023-07-12

Iranian Hackers Using Windows Kernel Driver

Agrius Threat Group: Iranian hackers are using a new Windows kernel driver called Wintapix to get unauthorized access to targeted systems.

2023-06-07

A New Approach To Cyber Security Helps Resist Extortion

Nearly 80% of organisations hit by ransomware are capable of recovering their critical data & systems, without paying a ransom.

2023-07-05

A Decade Of ‘Bad Magic’ In Cyber Espionage

Sophisticated Malicious Activities: A modular framework codenamed CloudWizard, which can take screenshots, record microphones & steal Gmail.

2023-07-04

The Limitations of AI

'Truth Is The Bottom Line': Carl Bernstein has warned that Artificial Intelligence is creating serious challenges for the future of journalism.

2023-06-05

Take Practical Measures To Avoid An Attack

The Common Threat: Failing to implement basic cyber security measures and not training your people presents an open door to hackers.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

CORDIS

CORDIS

CORDIS is the European Commission's primary public repository and portal to disseminate information on all EU-funded research projects and their results.

BruCERT

BruCERT

BruCERT is the referral agency for dealing with computer-related and internet-related security incidents in Brunei Darussalam.

NATO Communications and Information Agency (NCIA)

NATO Communications and Information Agency (NCIA)

The NCIA Cyber Security Service Line is responsible for planning and executing all life cycle management activities for cyber security.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies provides artificial intelligence solutions and information security solutions.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

Cyber Triage

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their network alerts.

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

Corelight

Corelight

Corelight is the most powerful network visibility solution for information security professionals.

Scantist

Scantist

Scantist is a cyber-security spin-off from Nanyang Technological University (Singapore) which leverages its expertise to provide vulnerability management solutions to enterprise clients.

Infosequre

Infosequre

Infosequre builds up your security awareness culture and turns your employees into the first line of defense against cyber risks.

Nu Quantum

Nu Quantum

Nu Quantum is developing quantum photonics hardware to power the quantum revolution in communications, sensing and computing.

Theta432

Theta432

THETA432 is a cybersecurity firm that provides 24/7/365 managed prevention, detection, response, Hybrid SOC, cyber defense monitoring services with dynamically defined defense (3D™).

Certo Software

Certo Software

Certo are trusted experts in mobile security. At Certo, mobile security is not an afterthought, it’s what we do.

Security4Media

Security4Media

Security4Media is a non-profit association set up to reduce risks and support trust in media, in the face of increasing cybersecurity threat levels.

EpicCyber

EpicCyber

Since 2011, Epic Cyber has pioneered the integration of enterprise cloud technology.