FREE TO VIEW


« Back to News

2025-05-01

Mastering Security In An Era Of Regulatory Shifts

Organisations need to change how they view email security and compliance, which is too often seen as a burden. By Nadine Hoogerwerf

2025-05-01

Co-op Shuts Down IT Systems After Attempted Hack

Another Big UK Retailer Targeted: The Co-op took preventive measures to protect its systems, shutting down business services for teams running stores.

2025-04-30

Scattered Spider Hacking Group Is Behind The Attack On M&S

Chaotic problems at M&S are being caused by a ransomware attack believed to be conducted by threat actors known as Scattered Spider.

2025-04-29

Five Top-Rated Threat Intelligence Platforms

Cyber Threat Intelligence: High quality analytics are priceless in curating thoughtful risk management and business continuity plans.

2025-04-29

British Government Needs To Lean On Automation To Bolster Cyber Resilience

Autonomous Endpoint Management: A precise overview of government IT assets & vulnerabilities, immediately improving cybersecurity. By Dan Jones

2025-04-29

Ransomware Attacks On The Energy Sector Surging

Operational Technology, Geopolitics & Hacktivism: Ransomware attacks targeting the energy and utilities sectors increased by 80% in 2024.

2025-04-29

Blackouts In Spain & Portugal Likely Caused By A Cyber Attack

Atmospheric Oscillation Or Hostile Action? A massive power outage has disconnected homes, industry and vital services across Spain & Portugal.

2025-04-28

Cybersecurity Risks In Legacy Scheduling Systems & How To Mitigate Them

Scheduling Software: Relying on legacy systems without actively investing in updates and patches can open businesses to cybersecurity risks.

2025-04-28

AI Uncovers A Cause Of Alzheimer’s Disease

Using AI, researchers at California University have revealed that there is a hidden DNA-binding function with a causal role in disrupting the brain.

2025-04-28

Chinese Hackers Exploiting Ivanti Connect Secure Vulnerability 

Ivanti has confirmed that a stack-based buffer overflow in Ivanti Connect Secure, Policy Secure & ZTA Gateways can lead to remote code execution.

2025-04-25

Traditional Cyber Insurance Isn’t Built For AI-Driven Attacks

Malicious Actors: As AI evolves, so does cybercrime - often outpacing the ability of businesses or insurers to respond effectively. By Randy Sadler 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Parasoft

Parasoft

Parasoft is an independent software testing and software quality assurance tool and solution vendor.

Holm Security

Holm Security

Holm Security are taking vulnerability assessment into the next generation as a cloud service.

Mondo

Mondo

Mondo is the largest national staffing agency specializing exclusively in high-end, niche IT, Tech, and Digital Marketing talent. Areas of expertise include Cybersecurity.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

Zighra

Zighra

Zighra is a leading provider of On-Device AI solutions for continuous authentication and fraud detection on mobile and web applications.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

Viakoo

Viakoo

Viakoo is an Enterprise IoT Applications Management company providing performance, security, and compliance. Viakoo enables you to be proactive in maintaining cyber hygiene and protecting your network

Cyber Defense Networking Solutions (CDNS)

Cyber Defense Networking Solutions (CDNS)

CDNS is a global network infrastructure provider whose platforms are engineered for security, optimized for speed and designed for resiliency.

HEQA Security

HEQA Security

HEQA Security (formerly QuantLR) offer the world’s most cost-effective, easy-to-integrate, and secure Quantum Key Distribution (QKD) solution

CERT.JE

CERT.JE

CERT.JE is responsible for promoting and improving the cyber resilience across the critical national infrastructure, business communities and citizens in Jersey.

Flexxon

Flexxon

Flexxon is the industry leader to develop NAND flash storage devices. Our key focus is to innovate memory devices ensuring data security and reliability.

Softwerx

Softwerx

Softwerx is the UK’s leading Microsoft cloud security practice. We’ve been helping forward-thinking companies better secure their businesses for nearly twenty years.

AHAD

AHAD

AHAD provides cybersecurity, digital transformation, and risk management services and solutions to Government, Fortune 500, And Start-Up Companies in the Middle East region.

NetRise

NetRise

NetRise was founded as a direct result of the many shortcomings currently in the device security market, specifically targeting the firmware of devices.

PureSoftware

PureSoftware

PureSoftware is a global software products and digital services company that is driving transformation for the world’s top organizations across various industry verticals.

Morrow Global Network

Morrow Global Network

Morrow is the global venture network for venture accelerators, studios, hubs, and their visionary leaders.