FREE TO VIEW


« Back to News

2023-02-08

Creating Order Out Of WAF Management Chaos

Web Application Firewall Management: How WAF rules are run & processed can provide security without sacrificing performance. By Paul McNamara

2023-02-08

SMBs Are Taking Cybersecurity More Seriously

A new report finds that Small & Medium Businesses are actively investing in cyber protection - but there is room for improvement. By Chris Mckie

2023-02-07

Human Error Is A Hacker's Dream

Human Behaviour Is A Vital Piece Of The Puzzle: Phishing, Vishing and MFA Fatigue all have a common characteristic. By Andrew Parsons

2023-02-11

Hackers Hit Thousands of Computers

Ransomware Targeting VMware ESXi Servers: Organisations are warned to take urgent action to protect their unpatched systems.

2023-02-07

Linux Malware Rates Reach Record Highs

Cyber Attack Trends: Until recently, cyber criminals largely ignored Linux compared to other more popular operating systems - not any more.

2023-02-08

Cyber Crime Is The World’s Third Largest Economy

Damage Totaling $8 Trillion Worldwide In 2023: If cybercrime were measured as a country it would be the 3rd largest economy.

2023-02-10

Google Shuts Down Misinformation

Dragonbridge: Google's threat analysis group has terminated thousands of Chinese-linked accounts spreading disinformation across social media.

2023-02-02

FBI Infiltrates Ransomware Group

The FBI infiltrated the notorious Hive ransomware group over seven months to block its attempts to extort funds from over a thousand victims.

2023-02-06

Ransomware Attack Targets VMware ESXi Servers

CERT France Warning: Ransomware attacks are targeting thousands of VMware ESXI servers, exploiting a known vulnerability first patched in 2021.

2023-02-06

Security Is Key To Remaining Innovative Amid Recession

Security Learning & Development: Now is the time for tech companies to invest in their employees and deploy upskilling programmes. By Alexia Pedersen

2023-02-06

Operational Resilience: More Than Disaster Recovery 

At a business level, disaster recovery is just one aspect of a larger discipline: operational resilience. By Sean Deuby & Simon Hodgkinson

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

CyberSeek

CyberSeek

CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.

Inter-American Cooperation Portal on Cyber-Crime

Inter-American Cooperation Portal on Cyber-Crime

The Inter-American Cooperation Portal on Cyber-Crime was created to facilitate and streamline cooperation and information exchange among government experts from OAS member states.

IPQualityScore (IPQS)

IPQualityScore (IPQS)

IPQS anti-fraud tools provide a real-time fraud score to analyze how likely a user or visitor is to engage in fraudulent behavior.

Cyber Science

Cyber Science

Cyber Science is the flagship conference of C-MRiC, focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.

HSB

HSB

HSB offers insurance for equipment breakdown, cyber risk, data breach, identity recovery & employment practices liability.

Jacobs

Jacobs

Jacobs is at the forefront of the most important security issues today. We are inspired to be the best and deliver innovative, mission-focused outcomes that matter to our clients.

Netragard

Netragard

Netragard has an established reputation for providing high-quality offensive and defensive security services.

Gigit

Gigit

Gigit’s Service portfolio focuses on your business’ needs and the integration of comprehensive cybersecurity policies, plans, procedures, and practices into your business culture and operations.

Psybersafe

Psybersafe

Psybersafe is a hands-on, behaviour-changing training system that keeps your people and your business cyber safe.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

Numen Cyber Technology

Numen Cyber Technology

Numen Cyber Technology is committed to becoming a Threat Discovery and Response expert for corporate customers.

NetRise

NetRise

NetRise was founded as a direct result of the many shortcomings currently in the device security market, specifically targeting the firmware of devices.

Aegis Cyber Defense Systems

Aegis Cyber Defense Systems

AEGIS is a powerful cybersecurity tool that can help protect your devices and networks from cyber threats, and increase performance.

Octane

Octane

Octane is an AI cybersecurity startup using machine learning to identify and fix vulnerabilities in blockchain codebases.