FREE TO VIEW


« Back to News

2022-05-09

India Issues A Directive For Reporting Cyber Incidents

The Indian government has issued a directive requiring organisations to report cyber security incidents to CERT-IN within six hours of their discovery.

2022-05-09

Only 3% Of Cyber Security Startups Are Led By Women

A new report finds that of the 654 startups that raised more than $1,000,000 in funding in 2020 and 2021, only 22 were led by female CEOs.

2022-05-09

Is Europe Ready For Cyber Warfare?

The European Commission wants an EU-wide “cyber shield” of security operations centres to provide an early-warning system for cyber attack.

2022-05-06

Cybersecurity Lessons From Ancient History

Nothing New: Ransomware operates in the same way as the Trojan Horse and history can teach us a lot about cyber security today. By Phil Ashley

2022-05-05

Are Your Employees The Weakest Link Against Cyber Crime?

The vast majority of cyber attacks involve employee error. A well-trained workforce is the greatest defence you can have. By Steve Whiter

2022-05-05

Find Your Security Vulnerability Before Hackers Do

Where is your network the most vulnerable? Here is a three point plan to fix the problem now, before hackers exploit it. By Keith Bromley

2022-05-05

Predictive Analytics Are The Future For Cyber Security

Organisations need a strategy to protect themselves and their data from growing cyber security threats. Predictive Analytics can help do that.

2022-05-04

Five Eyes Warn Of Russian Cyber Attacks

Five Eyes intelligence call for immediate action by critical infrastructure organisations to “prepare for and mitigate potential cyber threats”.

2022-05-04

Improve Your Password Security

Using the same passwords on multiple websites increases your cyber risk. Here is how to better protect your online accounts. By Adenike Cosgrove

2022-05-04

Hackers Are Blasting Facebook Users With Phishing Emails

A False Sense Of Urgency: A large scale phishing campaign is targeting Facebook users to steal their passwords & other personal information.

2022-05-03

Lapsus$ Hackers Targeted T-Mobile

Teenage Rampage: The Lapsus$ hacking group got acces to T-Mobile’s source code using stolen credentials, before their final arrest.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

RISA

RISA

RISA solutions help to secure networks, improve overall network security, and achieve government regulatory compliance.

TWNCERT

TWNCERT

TWNCERT is the National Computer Emergency Response Team of Taiwan.

Cyber Fusion Center - Maryville University

Cyber Fusion Center - Maryville University

Maryville University Cyber Fusion Center is a virtual lab for working on real-world cyber security challenges.

International School of IT Security (ISITS)

International School of IT Security (ISITS)

The International School of IT Security (ISITS) is a leading provider of professional training in the field of IT Security.

Seceon

Seceon

Seceon OTM, is a cyber security advanced threat management platform that visualizes, detects, and eliminates threats in real time.

EdgeWave

EdgeWave

EdgeWave provides simple but highly effective data security and advanced threat protection in solutions that are affordable, scalable and easy to use.

Pipeline Security

Pipeline Security

Pipeline is a leader in cybersecurity, offering comprehensive services to protect organizations from evolving threats.

Corsha

Corsha

Corsha is on a mission to simplify API security and allow enterprises to embrace modernization, complex deployments, and hybrid environments with confidence.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

Enzoic

Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection.

SecureLayer7

SecureLayer7

SecureLayer7 is an international provider of integrated business information security solutions with an innovative approach to IT security.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.

Control D

Control D

Control D is a modern and customizable DNS service that blocks threats, unwanted content and ads - on all devices.

Deepware

Deepware

Deepware is an emerging AI research company dedicated to exploring the potential of GenAI in both generation and detection.