FREE TO VIEW


« Back to News

2022-03-01

Increasing Use Of Encryption For Malicious Purposes

Older Servers Are More Vulnerable: Attackers have dicovered the correlation between poor HTTPS configurations and a vulnerable web server.

2022-02-25

New Tools To Simulate Electronic Warfare

Swarming Munition: The US Air Force is testing autonomous software to simulate electronic warfare in complex, multiple target settings.

2022-02-22

The EU Mobilises Its Cyber Rapid Response Team To Deal With Russian Attacks

Ukraine is at the front line in global cyber conflict and a testbed for intelligence services to deploy their offensive cyber and espionage tools.

2022-02-21

The New Security Demands Of Our Hybrid Working Future 

Remote user access has become the new normal, but the rapid transition means some businesses are not adequately prepared. By Ian Porteous

2022-02-21

Facebook To Pay $90m Penalty For Tracking Users

Facebook accused of breaking US laws by using plug-ins to store cookies that tracked users visiting websites containing Facebook “like” buttons.

2022-02-17

Ukraine Defence Ministry & Banks Under Cyber Attack

The Ukraine Stratcom Centre says that 'false flag' attacks on its Defence Ministry and two banking websites are intended to spread alarm & confusion.

2022-02-16

Cyber Security Regulations For Smart Devices

Smartphones, TVs, Speakers & Routers: The British government has introduced new legislation to better protect consumers' IoT devices.

2022-02-16

Qbot Malware Can Read Your Email

Despite its age, Qbot malware has been continually developed and continues to be a dangerous and persistent threat to organisations.

2022-02-15

Russian Cyber Attacks On Ukraine Increase

Cyber attacks will form part of a broad campaign if Russia invades Ukraine, with malware and online disinformation among the weapons deployed.

2022-02-15

Making Security Seamless - The Common Identity Platform

By establishing a Common Identity Platform, it is perfectly possible to achieve a seamless identity management service. By Jacob Ideskog

2022-02-17

IT Technician Jailed For Revenge Attack After Being Fired

A British IT technician has been jailed for a revenge cyber attack on a school after being sacked for not disclosing a record of criminality.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

softScheck

softScheck

softScheck is an IT security consultancy. Services range from pentesting and compliance testing to security auditing of software and IT infrastructure.

Sogeti

Sogeti

Sogeti deliver solutions that enable digital transformation and offer cutting-edge expertise in Cloud, Cybersecurity, Digital Manufacturing, Quality Assurance, Testing, and emerging technologies.

idappcom

idappcom

idappcom provides unique industry approved software solutions for auditing and enhancing the threat recognition and response capabilities of your corporate security defences.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

Amadeus Capital Partners

Amadeus Capital Partners

Amadeus Capital Partners offers over 20 years’ experience in technology investment. Our areas of focus include AI & machine learning and cyber security.

Digital Fingerprints

Digital Fingerprints

Digital Fingerprints provides continuous authentication with behavioural biometrics. Protection against account takeover and session takeover. Compliant with GDPR and PSD2.

Syndis

Syndis

Syndis is a leading information security company helping to defend organizations by providing bespoke services and innovative security solutions in the global market.

Nonprofit Cyber

Nonprofit Cyber

Nonprofit Cyber is a first-of-its-kind coalition of global nonprofit organizations to enhance joint action to improve cybersecurity.

Oxeye

Oxeye

Oxeye fills the gap between cloud and code to show exploitable vulnerabilities, and their path from API to code. More visibility. Less noise. More time to build.

Crygma

Crygma

CRYGMA Quantum-Resistant Cryptographic Machines, the new standard in data encryption.

Edera

Edera

Edera is changing the way containers are run and secured, making isolation a reality and fundamentally transforming computing in the process.

Aprio

Aprio

Aprio is a premier business advisory and accounting firm. We deliver advisory, tax, managed, and private client services to build value, drive growth, manage risk, and protect wealth.

YSecurity

YSecurity

At YSecurity, we simplify compliance, prevent breaches, and help startups scale with confidence. Focus on growth—we’ll handle the security.

LiveAction

LiveAction

LiveAction’s Network Intelligence platform transforms complex data into actionable insights, providing organizations with a comprehensive view of their network.