FREE TO VIEW


« Back to News

2023-05-26

Vulnerable Networks & Advanced Persistent Threats

A poor level of visibility into networks exposes organisations to cyber risks and consequent large-scale disruptions, inflicting substantial losses.

2023-05-25

The Security Risks Of ChatGPT

How Businesses Can Safeguard Their Data: With ChatGPT, criminals can quickly develop malware that wreaks havoc on companies. By Richard Massey

2023-05-24

AI Generated Images Shake The Stock Market

Fake images of an explosion which were most likely created using AI tools caused a brief slump in the NYSE and other financial markets.

2023-06-05

Cybersecurity & The Military

How to Find and Keep the Right People: The US military delivers excellent professional training and faces a struggle to retain its cyber talent.

2023-05-23

Artificial Intelligence To Replace 55,000 Telecom Jobs

A 42% Headcount Reduction: British Telecom plans a much smaller workforce and a significantly reduced cost base by deploying AI.

2023-05-23

Julius Caesar Used Encryption. Shouldn’t You?

For data security needs and for achieving regulatory compliance, encryption should be the baseline for any data security strategy. By Colin Tankard

2023-05-22

Meta Will Contest EU $1.3B Data Privacy Fine

The owner of Facebook has been fined a record $1.3 billion for transferring EU user data to the US, in breach of a previous EU court ruling.

2023-05-22

AI Will Be Disruptive - For Both Security & Jobs

Chatbots & Language Processing: Large numbers of people risk becoming jobless with the changes that ChatGPT-style, generative AI will bring.

2023-05-20

‘Godfather Of AI’ Warns Of Imminent Dangers

Deep Learning: Geoffrey Hinton has left his job at Google after a decade, in order to express his real concerns about the risks of AI technology.

2023-05-20

$10M Reward For Arrest Of Russian Hacker

Wanted: Mikhail Pavlovich Matveev is believed to be the originator of the Zeus banking Trojan and Cryptolocker ransomware attack. 

2023-05-22

Web Application Security Testing: A Complete Guide

Web application security testing plays a vital role in protecting sensitive data from potential threats like SQL injection and cross-site scripting.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

CyberArk Software

CyberArk Software

CyberArk is an established leader in privileged access management and offers the most complete set of Identity Security capabilities.

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

National Cyber Security Authority (NCA) - Saudi Arabia

National Cyber Security Authority (NCA) - Saudi Arabia

The NCA is the government entity in charge of cybersecurity in Saudi Arabia and serves as the national authority on its affairs.

C3.ai

C3.ai

The C3 AI Suite supports configurable, pre-built, high value AI applications for predictive maintenance, fraud detection, anti-money laundering, sensor network health and more.

Trustless Computing Association (TCA)

Trustless Computing Association (TCA)

TCA is is a non-profit organization promoting the creation and wide availability of IT and AI technologies that are radically more secure and accountable than today’s state of the art.

Cyber Physical Security Research Center (CPSEC)

Cyber Physical Security Research Center (CPSEC)

CPSEC aims to contribute to the security enhancement of industrial infrastructure that creates value across cyber space and physical space.

BLUECYFORCE

BLUECYFORCE

BLUECYFORCE is the leading professional training and cyber defense training organization in France.

Singular Security

Singular Security

Singular Security help public and private organizations minimize cybersecurity risk and pass their IT compliance audit.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions to the alternative investment industry.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

Health Sector Cybersecurity Coordination Center (HC3)

Health Sector Cybersecurity Coordination Center (HC3)

HC3 was created by the US Department of Health and Human Services to aid in the protection of vital, controlled, healthcare-related information.