FREE TO VIEW


« Back to News

2022-04-20

Microsoft Removes Domains Used For Cyber Attacks On Ukraine

Fancy Bear: Microsoft has seized control of seven domains used by Russian threat actors for attacks that targeted digital access in Ukraine.

2022-05-02

EU Officials Targeted with Pegasus Spyware

Unprecedented Intrusion: Senior European Union officials, including the Justice Commissioner, were targeted with Pegasus spyware.

2022-04-20

Remote Access Scams Open The Door To Thieves

British users lost £50m in remote access scams where victims are tricked into handing over control of their computer or smartphone to criminals.

2022-04-21

Algorithms, Lies & Social Media

Achieving a more transparent and less manipulative online media may well be the defining political battle of the 21st century.

2022-04-19

Russia’s AI Plans Might Not Survive The Ukraine War

Russian ambitions to become a leader in Artificial Intelligence are being frustrated by Western sanctions and global high-tech isolation.

2022-04-18

The Ukraine War - By Satellite, Internet & Phone

Technology can serve a vital purpose in this conflict, facilitating the exposure of Russian propaganda & accelerating efforts to defeat their forces. 

2022-04-18

Types Of Security Testing Explained With Examples

Security testing encompasses all testing activities to ensure an application is correct and has faultless operation in a test environment.

2022-04-14

What Can The Healthcare Sector Learn From 2021’s Threat Landscape?

A Unique Challenge: At a time when the health sector is at its most vulnerable, it should also be at its most secure. By Ian Porteous

2022-04-13

EU & US Agree New Data Rules To Replace Privacy Shield

A new framework for cross-border data transfers provides some welcome clarity for the big US technology firms, including Meta, Microsoft & Google.    

2022-04-13

Cyber Criminals Volunteer For War In Ukraine

Hacking Groups Hit Critical Infrastructure: Anonymous in one corner and Conti in the other as cyber criminals take sides in the Ukraine conflict.

2022-04-12

Impress Your Cyber Insurance Underwriters With These Essential Tips

Cyber insurance is becoming harder to obtain. One solution is to make sure that key corporate assets are only accessible to authorised users.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO CCDCOE's mission is to enhance the capability, cooperation and information sharing among NATO, NATO nations and partners in cyber defence.

Aptive Consulting

Aptive Consulting

Aptive is a cyber security consultancy providing Penetration Testing and Vulnerability Assessment services.

S2 Grupo

S2 Grupo

S2 Grupo is the benchmark company in Europe and Latin America, for Cyber Intelligence and mission critical systems operations.

BitSight Technologies

BitSight Technologies

BitSight transforms how companies manage information security risk with objective, verifiable and actionable Security Ratings.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

NeuShield

NeuShield

NeuShield is the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

Future Technology Systems Company (FutureTEC)

Future Technology Systems Company (FutureTEC)

FutureTEC is a leading Information Technology Solutions Provider, delivering world-class Information Security, Information Management, and Business Solutions.

CyberEdBoard

CyberEdBoard

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management.

Riot Security

Riot Security

In today's world, most successful cyberattacks start by a human failure. Riot have developed a platform that makes it easy to prepare your employees for cyberattacks, in a way they love.

Network Contagion Research Institute (NCRI)

Network Contagion Research Institute (NCRI)

NCRI provides pioneering technology, research, and analysis to identify and forecast cyber-social threats targeting individuals, organizations, and communities.

TIM Enterprise

TIM Enterprise

TIM Enterprise offers innovative, sustainable and secure 360-degree digital solutions to companies and public administrations.

AI Security Institute (AISI)

AI Security Institute (AISI)

The AI Security Institute’s mission is to minimise surprise to the UK and humanity from rapid and unexpected advances in AI.

Backslash Security

Backslash Security

With Backslash, AppSec teams gain visibility into critical risks in their apps based on reachability and exploitability.

Assurestor

Assurestor

Assurestor's singular focus is delivering leading cloud-based backup and disaster recovery designed to increase levels of IT resilience.