FREE TO VIEW


« Back to News

2023-04-19

British Cyber Security Agency Issues An Alert

Russian Hackers Target Critical Infrastructure: Russia seeks to "disrupt or destroy" Britain's critical infrastructure, Cabinet Office warns.

2023-04-19

Online Safety Bill UK: WhatsApp, Encryption & The Implications For Privacy

The Legislation Focuses On Child Protection: So why are WhatsApp and other organisations opposing the proposed new laws? By Andrew Parsons

2023-04-26

Selling Digital Insecurity

Offensive cyber capabilities pose a significant threat to international security. Such capabilities can also cause significant damage.

2023-04-25

As A Business Leader, You Must Manage Cyber Risk 

Cyber attacks are a key risk for boards and any director seeking to add value for corporate stakeholders should appreciate the growing jeopardy.

2023-04-18

Soft Cell Hackers Have New Targets

An international hacking campaign targeting global telecommunications companies to extract personal data of persons of interest to China.

2023-04-24

Israeli Hacking Spyware In Widespread Use

New Israeli-made spyware resembling NSO Group's notorious Pegasus malware has been used to target journalists & politicians in many countries.

2023-04-25

Alibaba Plans An Artificial Intelligence Rival To ChatGPT

Truth Via A Thousand Questions: Chinese technology giant Alibaba will launch its own ChatGPT-style product called Tongyi Qianwen.

2023-04-21

EU Payroll & HR Services Giant Under Attack

The payroll services firm SD Worx has shut down IT systems and told its customers that its UK & Ireland division has suffered a cyber attack.

2023-04-24

2023’s Most Wanted Malware

Qbot Emotet & Formbook Top The Threat Index: Check Point Software Technologies has published its Global Threat Index for March 2023.

2023-04-19

TikTok Will Comply With US Law

Under intense pressure, the parent company of TikTok, ByteDance, says that it will 'continue to protect' US user data from access by China.

2023-04-17

Social Media’s Impact On The War In Ukraine

Second Front: The big tech companies are involved in the conflict, both as tools of propaganda, as facilitators of communication and collaboration.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

Group-IB

Group-IB

Group-IB is a leading provider of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigating high-tech crimes, and protecting intellectual property.

TWNCERT

TWNCERT

TWNCERT is the National Computer Emergency Response Team of Taiwan.

Ignyte Assurance Platform

Ignyte Assurance Platform

Ignyte Assurance Platform™ is a leader in collaborative security and integrated GRC solutions for global corporations in Healthcare, Defense, and Technology.

BrainChip

BrainChip

BrainChip is the leading provider of neuromorphic computing solutions, a type of artificial intelligence that is inspired by the biology of the human neuron - spiking neural networks.

Cyber Academy

Cyber Academy

Cyber Academy is one of the first institutions in the SE Europe region that provides a hands-on program in cyber security, blockchain and AI.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

Intaso

Intaso

Intaso are a boutique head hunting and talent solution firm with specialist Cyber and Information Security expertise.

TechMD

TechMD

TechMD (formerly ICS) is an award-winning IT solutions firm that specializes in cloud solutions, managed cybersecurity services, strategic IT consulting, and managed IT services.

Grindstone Ventures

Grindstone Ventures

Grindstone Ventures is a post-seed fund that supports post-seed equity and quasi-equity investments in early-stage innovation-driven and/or technology companies.

Dope Security

Dope Security

Dope Security is a fly-direct Secure Web Gateway that eliminates the data center stopover architecture required by legacy providers, instead performing security directly on the endpoint.

MyKRIS Asia

MyKRIS Asia

MyKRIS specialise in providing and managing Internet network services and cyber security services to enterprises.

LOCH Technologies

LOCH Technologies

LOCH Wireless Machine Vision platform delivers next generation cybersecurity, performance monitoring, and cost management for all 5G and for broad-spectrum IoT, IoMT and OT wireless environments.

BTQ Technologies

BTQ Technologies

BTQ is a global quantum technology company focused on securing mission critical networks.

Enterprise Strategy Group

Enterprise Strategy Group

Enterprise Strategy Group, a division of TechTarget, is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community.

Trustlink Technologies

Trustlink Technologies

Trustlink Technologies is an information technology company founded with a steadfast vision to fortify the digital landscapes of businesses through a foundation of trust.