FREE TO VIEW


« Back to News

2021-06-02

Avoiding The Privacy Paradox In The Workplace

Internet users are rightly becoming more concerned about data tracking and their personal privacy. There are some ways to get protection.

2021-06-02

Online Fraud Costs British Investors £63m

Over 12 months 5,039 reports of investment fraud made reference to a social media platform, with over a third of complaints involving Instagram.

2021-06-02

Cyber Security: Its Good To Talk

Cyber security is all about the human factor and being transparent about mistakes can help your organisation's people learn to stay safe online.

2021-06-01

Preventing Ransomware Attacks

The chances of ransomware infection can be significantly reduced by security software and by paying sufficient attention to some basic rules.

2021-06-01

Denmark Helped NSA Spy On European Union

Denmark gave the US spy agency access to internet data streams and intercepted critical voice, text & data communications between EU leaders.

2021-05-31

Ransomware And Its Criminal Use

Ransomware attackers are ferocious. If you haven’t been attacked yet, it’s not a matter of if, but when. Be prepared. Defend, backup and protect.

2021-05-31

Get The Best Cyber Security Audits & Training

Organisations often invest heavily in cyber security technology, but they don’t spend enough time on training, audit and the vital human factor.

2021-05-31

WEBINAR: How To Architect An Identity Management Strategy In AWS

17th June | An IAM strategy can help organizations grant users and customers access to the right resources under the right conditions.

2021-05-31

Missing Patches Place Security At Risk

Public sector security professionals admit that one in three UK breaches result from vulnerabilities that they should have already patched.

2021-05-28

Managing A Remote Team To Protect Against Cyber Attacks

Many more organisations are adopting remote working, but how can they manage a remote team while prioritizing cybersecurity? By Chioma Iwunze

2021-05-29

The Underlying Ethics Of Data Scraping & Mining

Data scraping is an inevitable part of the way the internet works but those interested in collecting data this way should abide by ethical rules.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

MIT Internet Policy Research Initiative (IPRI)

MIT Internet Policy Research Initiative (IPRI)

IPRI's mission is to work with policy makers and technologists to increase the trustworthiness and effectiveness of interconnected digital systems

Sequitur Labs

Sequitur Labs

Sequitur Labs is developing seminal technologies and solutions to secure and manage connected devices of today and in the future.

Uppsala Security

Uppsala Security

Uppsala Security built the first crowdsourced Threat Intelligence platform known as the Sentinel Protocol, which is powered by blockchain technology.

Ioetec

Ioetec

Ioetec's mission is to connect users to their IoT devices securely, ensuring these devices remain safe to use in our increasingly connected world.

Novastor

Novastor

NovaStor® is an award-winning, international data backup and recovery software company with solutions supporting physical, virtual and cloud environments.

Strategic Cyber Ventures (SCV)

Strategic Cyber Ventures (SCV)

SCV grow cybersecurity companies that disrupt advanced cyber adversaries and revolutionize the cyber product marketplace.

Cyber Smart Defense

Cyber Smart Defense

Cyber Smart Defense is a specialist provider of penetration testing services and IT security audits.

Infinidat

Infinidat

Infinidat delivers enterprise-proven solutions for data storage, data protection, business continuity, and sovereign cloud storage.

Skudo

Skudo

Skudo is dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

Cyber Coaching

Cyber Coaching

Cyber Coaching is a community for enhancing technical cyber skills, through unofficial certification training, cyber mentorship, and personalised occupational transition programs.

Ampcus Cyber

Ampcus Cyber

Ampcus Cyber specialize in providing comprehensive security solutions and services that are tailored to safeguard our clients' networks, infrastructure, and valuable assets.

Trustaira

Trustaira

Trustaira is the first deep tech solution and service company in Bangladesh.

Lineaje

Lineaje

Lineaje solves critical Software Supply Chain security problems faced by every organization that builds, uses or sells software.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.

DNS Research Federation (DNSRF)

DNS Research Federation (DNSRF)

DNSRF's mission is to advance the understanding of the Domain Name System's impact on cybersecurity, policy and technical standards.