FREE TO VIEW


« Back to News

2022-11-01

The Challenges Of Moving To Zero Trust

It's A Journey: Implementing a Zero Trust strategy must take account of both legacy technology and the timescale required. By Kevin Ware-Lane

2022-11-01

A Multi-layered Approach To Data Resilience

Going Beyond Backup & Recovery: Use automation, orchestration, multiple format copies & data snapshots to save critical data. By Florian Malecki

2022-11-01

Proactive Cyber Security Is A Must Have

When 'You're being offensive" is a compliment: Playing the enemy at their own game using offensive cyber security practices. By Pablo Zurro

2022-11-01

Cyber Security Threats For The US Midterm Elections

Election officials have been alerted to protect their voting systems and be vigilant about political violence in a "very complex threat environment."

2022-10-31

British Prime Minister’s Phone Hacked

Agents suspected of working for Russia were responsible for the alleged hacking of Liz Truss's mobile phone while she was Foreign Secretary.

2022-11-07

Artificial Intelligence & Its Impact On Cyber Security

Detecting the most dangerous attacks that can take down the network, versus intrusions which are problematic but won't take everything down.

2022-10-31

Make Sure Your MSP Isn’t Your Security Achilles’ Heel

Supply Chain Risks: Seven traits you need to identify to be sure your Managed Services Provider has a strong security stance. By Leyton Jefferies

2022-10-29

US Military Involved In Ukraine's Cyber Defences

US Cyber Command teams are engaged in "Hunt Forward" missions, searching the computer networks of its allies for signs of penetration.

2022-10-31

Ed Sheeran's Music Pirate Jailed

Spirdark: A hacker has been convicted for copyright theft after stealing 1,263 unreleased songs by 89 artists and selling them on the Dark Web.

2022-10-28

Iranian Hackers Target US Midterm Elections

An Iranian threat group is preparing to interfere in the forthcoming US elections, targeting officials & companies involved with the voting process.

2022-10-26

The Five Stages Of A Cyber Attack

Attack Paths Matter: Escalating access privileges from Ordinary User to Admin can give attackers almost unlimited power. By Bryan Patton

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TZ-CERT

TZ-CERT

TZ-CERT is the National Computer Emergence Response Team of Tanzania.

Samsung Knox

Samsung Knox

Samsung Knox brings multi-layered defence-grade security to your business’s smartphones and tablets.

SparkCognition

SparkCognition

SparkCognition’s AI-powered solutions enhance cybersecurity, identify and prevent equipment failures before they happen, and provide prescriptive intelligence for maintaining your most critical assets

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

European Cyber Security Conference

European Cyber Security Conference

EU Cyber Security Conference will debate what Europe’s response to evolving threats in a dynamic global risk landscape should look like and what the next steps for all actors of the ecosystem.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

Dcode

Dcode

Dcode connects the tech industry and government to drive commercial innovation in the federal market.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance is a global, non-profit industry association which is working to enable a secure connected future.

CIBR Warriors

CIBR Warriors

CIBR Warriors are a leading cyber security and networking staffing company that provides workforce solutions with businesses nationwide in the USA.

Infostream

Infostream

Infostream is a leading integrator of Digital Transformations Solutions (DTS); Public, Private, and Hybrid Cloud; Cybersecurity; Data Integrity; DevOps, DevSecOps, and Infrastructures.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

TrustMe

TrustMe

TrustMe’s integrated platform for business trust and resilience keeps organizations safe, secure, and trustworthy.

Arculus Cyber Security

Arculus Cyber Security

Arculus Cyber Security enables customers to securely realise the benefits of digital transformation through pragmatic solutions, guidance and services.

Valmet

Valmet

Valmet is a leading global developer and supplier of process technologies, automation and services for the pulp, paper and energy industries.