FREE TO VIEW


« Back to News

2022-09-23

Quantum Computing Raises As Many Problems As It Solves

Quantum computing poses both opportunities and risks to the cyber security environment and above all, a serious threat to encrypted communications.

2022-09-22

Even Air-Gapped Computers Are Vulnerable To Attack

LaserShark: Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked via optical channels.

2022-09-22

Artificial Intelligence Distorts Government Decision-Making

AI reinforces the divisions of democracy and might also confound autocratic regimes, by concealing underlying social splits with false consensus.

2022-09-21

Why Domain Protection Is A Key Pillar Of Cybersecurity

Protecting Domain Names Is Vitally Important: Homograph 'look alike' attacks are one of the major challenges in cyber security. By Brian Lonergan

2022-09-21

DARPA Wants To Play With Artificial Intelligence

Gamebreaker: DARPA wants to apply AI to existing real-time conflict strategy games to exploit every hidden and unfair advantage available.

2022-09-21

NATO Secret Missile Data Found On The Dark Web

Failed Ransom Attack: Missile maker says the stolen data was acquired from a compromised external hard drive, rather than a network breach.

2022-09-20

Dutch Town Sues Twitter For Paedophile Conspiracy

False Witness: A small Dutch town is suing Twitter over a conspiracy theory claiming it was once home to a ring of Satanic paedophiles.

2022-09-16

Cyber Training And The Skills Shortage

The cybersecurity skills gap is still a significant worry for C-level executives and is moving up the board's priority list. By Nisha Nemasing Rathod

2022-09-17

A New Supply Chain Security Solution

Organisations of any size are enabled to collaborate on and share data in near real-time, confident in the trustworthiness of that data.

2022-09-17

Welcome To NATO - Finland’s Parliament Attacked

The attack against the Helsinki parliament occurred the same day that President Biden signed off Finland & Sweden’s accession into NATO.

2022-09-19

CISA's Threat Intelligence Program Was Defective

Contextual Information: CISA's threat intelligence advice for US federal agencies is criticised for lacking sufficient actionable detail.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Satisnet

Satisnet

Satisnet is a leading Security Reseller, Managed Security Services Provider (MSSP) and Cyber Training Innovator, with operations throughout the UK, EMEA and United States.

Redscan Cyber Security

Redscan Cyber Security

Redscan Cyber Security is a Managed Security Services Provider (MSSP) that enables businesses to effectively manage their information security risks.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

Swiss Re

Swiss Re

Swiss Re Group is a leading wholesale provider of reinsurance, insurance and other insurance-based forms of risk transfer including cyber risk.

Wireless Logic

Wireless Logic

Wireless Logic delivers a range of secure and resilient value-added M2M/IoT managed services that empower remote devices to communicate cost-effectively, two ways.

HudsonCyber

HudsonCyber

HudsonCyber, part of HudsonAnalytix, provides leading cyber risk management services for the global maritime transportation industry.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

HorizonIQ

HorizonIQ

HorizonIQ (formerly Internap Corp / INAP) maximizes efficiency and innovation with flexible infrastructure solutions.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.

CyberGuard Technologies

CyberGuard Technologies

CyberGuard Technologies provides a suite of fully managed end-to-end security services from its 24/7 UK security operations centre.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

SecureChain AI

SecureChain AI

SecureChain are combining blockchain and AI technology to create a smarter blockchain platform especially in terms of security.

42Crunch

42Crunch

42Crunch provides API security testing and threat protection. We proactively test, fix and protect your APIs from development to runtime.

Deloitte Denmark

Deloitte Denmark

Swift incident management, worldwide support, and advanced defense strategies ensure comprehensive recovery and enterprise security with our IR service.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.