FREE TO VIEW


« Back to News

2020-12-21

Advanced Threat Detection And Response: Critical Steps

In every organisation it’s now critical to implement effective threat detection systems and respond to potential danger promptly. By Jennifer Holland

2020-12-20

Tech Support Scams Steal Millions

Criminals are cold calling victims, pretending to be from reputable ISPs, claiming that the victim has a problem with their computer or internet.

2020-12-18

The End Of The American Cyber Empire

Russia has accomplished the goal of undermining the entire low intensity conflict “battlefield” of the American cyber system. By Ronald Marks

2020-12-18

Russian Hackers Have Stolen US Secrets

Some of The USA's most deeply held secrets may have been stolen by Russian government hackers in a heavy multi-pronged attack just revealed.

2020-12-17

Business Cyber Security Spending In 2021

Although more exposed than ever, PWC say that 25% of organisations are planning to downsize their cyber budgets in the forthcoming 12 months.

2020-12-16

Europol Warning Of The Growing AI Cyber Threat

AI will become increasingly popular among cyber criminals who are beginning to use it to target their victims and to maximise hacking operations.

2020-12-16

Practice Makes Protected – CYRIN’s Tools Packages

BRAND NEW! – See the New Cyber Tools Packages from CYRIN – Find out about CYRIN's virtual cyber range. Get Your Free Trial.

2020-12-15

E-Businesses That Don’t Require Employees

Starting a business that doesn't require employees keeps overhead expenses down and intelligent use of Technology makes a really big difference.

2020-12-15

Insider Security Risk Soars During Lockdown

User behavior under lockdown is a dominant risk and 58% of IT professionals believe employees might ignore security rules and put data at risk.

2020-12-15

The Personal Data Being Used To Get Your Vote

Everything about you, from your phone number to your salary and home address, is collected and traded by political campaigns and consultants.

2020-12-14

Ethiopian Telecoms System Has Critical Security Flaws

A white-hat hacker has found critical security flaws in Ethiopia’s mobile telecom network that would allow hackers to control the entire system.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Oppida

Oppida

Oppida provides tailored IT security services to help you identify security gaps and assist in finding the most effective remediation.

National Cyber Security Centre (NCSC) - Netherlands

National Cyber Security Centre (NCSC) - Netherlands

NCSC Netherlands coordinates enhancing the cyber resilience of the Netherlands in the digital domain.

Cyber Risk & Insurance Forum (CRIF)

Cyber Risk & Insurance Forum (CRIF)

CRIF helps organisations understand cyber risks and the damage that might occur by supporting the development of effective insurance solutions.

NXO France

NXO France

NXO is an independent leader in the integration and management of digital workflows with services covering digital infrastructures, communications & collaboration, and security.

Fair Isaac Corporation (FICO)

Fair Isaac Corporation (FICO)

FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, optimize operations and meet strict government regulations.

IDnow

IDnow

IDnow is the world’s fastest, most flexible and most secure identity verification platform, delivering instant verification of the identity documents used by 7 billion people.

SQN Banking Systems

SQN Banking Systems

SQN Banking Systems fraud detection software products are a critical step towards overcoming the growing problem of fraud across the various payment channels.

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

Jump Capital

Jump Capital

Jump provides series A and B capital to data-driven tech companies within the FinTech, IT & Data Infrastructure, B2B SaaS and Media sectors.

Mayhem

Mayhem

Mayhem, by ForAllSecure, is a developer-first application and API security testing solution.

Tetra Defense

Tetra Defense

Tetra Defense is a leading incident response, cyber risk management and digital forensics firm.

Iconium Software

Iconium Software

DataLenz by Iconium offers continuous and real-time tracking of your data assets delivering you the tools you need to successfully reach and maintain your target security standards.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

PyNet Labs

PyNet Labs

PyNet Labs is a Training Company serving corporates as well as individuals across the world with ever-changing IT and technology training.

Fairly AI

Fairly AI

Fairly AI is on a mission to democratize safe, secure, and compliant AI across the enterprise.

UltraViolet Cyber

UltraViolet Cyber

UltraViolet is an industry leading tech-enabled managed security services company.