FREE TO VIEW


« Back to News

2021-12-07

A Short Guide To Building Cloud-Based SaaS Applications

Cloud based SaaS apps have many advantages: they are cost-effective, reliable, update automatically & have a high level of security. By Kate Harrison.

2021-12-06

NSO Spyware Used To Hack The State Department

NSO Group’s spyware has been used by an unknown assailant to hack the mobile phones of at least nine United States State Department employees.

2021-12-06

Panama Boosts Maritime Cyber Security

Panama, the world's largest merchant shipping state, is working to improve the cyber security & safety of the many maritime vessels that fly its flag.

2021-12-06

What Every PHP Developer Needs to Know About Cyber Security

PHP is the most common programme language and it's essential for web developers to have good cyber security skills to protect users. By Colin Rooney 

2021-12-02

Dealing With Scam Emails

A False Sense Of Security: What to do if you receive a suspicious message that looks like its from your corporate email address. By Eliza Sadler

2021-12-02

What Is An API, Anyway?

AN API is the acronym for a software intermediary that allows two applications to talk to each other - which is is a very important security feature.

2021-12-02

Clearview Faces £17 Million Penalty For Breaching Data Laws

The data of a substantial number of Britons may have been scraped from social media platforms and other online sources without consent.

2021-12-01

British Spies Must Adapt to Survive

Britain's secret spy agency will have to become “more open to stay secret” and work with tech companies to counter threats from China and Russia.

2021-11-30

Britain Is Fighting A Ransomware Epidemic

The NCSC has tackled a record number of cyber incidents over the past year and ransomware attacks from Russia are the dominant feature.

2021-11-30

Worldwide Cyber Security Threats

Cyber security threats, risks & challenges share many common factors in exploiting vulnerabilities, but vary significantly from one country to another.

2021-11-30

Tesla Drivers Can’t Unlock Their Cars

Network Outage: Technology makes things convenient, but reliance on a server working all the time can be downright dangerous for Tesla drivers.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cynet

Cynet

Cynet simplifies security by providing a rapidly deployed, comprehensive platform for detection, prevention and automated response to advanced threats with near-zero false positives.

Varonis

Varonis

Varonis provide a security software platform to let organizations track, visualize, analyze and protect their unstructured data.

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

InfoWatch

InfoWatch

InfoWatch solutions allow you to protect data and information assets that are critically important to your business.

AcceptLocal

AcceptLocal

AcceptLocal is a payments industry consultancy with expertise in payment processing, payment security, anti-money laundering and fraud prevention.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

InfoGuard

InfoGuard

InfoGuard is a leading Swiss company providing comprehensive cyber security and network solutions.

Data Protection People

Data Protection People

Data Protection People are specialists in Data Privacy, Governance, and Information Security.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

Lightship Security

Lightship Security

Lightship Security is an accredited Common Criteria and FIPS 140-2 IT security testing laboratory that specializes in test conformance automation solutions and IT product security certifications.

Charities Security Forum (CSF)

Charities Security Forum (CSF)

The Charities Security Forum is the premier membership group for information security people working for charities and not-for-profits in the UK.

Labs/02

Labs/02

Labs/02 is a seed-stage incubator with a mission to advance cutting-edge technology in innovative areas including AI, deep learning, autonomous transportation, and smart cities.

Zemana

Zemana

Zemana provides innovative cyber-security solutions to deal with complex malicious software and other cyber threats.

Delinea

Delinea

Delinea is a leading provider of cloud-ready privileged access management (PAM) solutions that empower cybersecurity for the modern, hybrid enterprise.

Cyberscope

Cyberscope

Cyberscope is a Web3 security firm specializing in smart contract audits, crypto security audits, and blockchain vulnerability assessments.

Atlantica Digital

Atlantica Digital

Atlantica design and create highly innovative software solutions and solid, scalable and secure IT infrastructures for a constantly evolving market.