FREE TO VIEW


« Back to News

2024-12-05

Are Your Deduplication Capabilities Good Enough?

Effective mitigation requires quick evaluation of alerts. Teams must tackle the twin issues of false positives & duplicate alerts. By Greg Anderson

2024-12-05

NIST'S Post-Quantum Standards Are Just The Beginning

Evolving quantum threats call for a broader, more comprehensive approach to strengthening network security. Q&A with Andy Leaver

2024-12-04

Empowering Women To Take On More Roles In Cybersecurity

Bridging The Gap in Cybersecurity Roles: Diversity is crucial in cybersecurity & improves the overall defense of organizations. By Nazy Fouladirad

2024-12-03

What Is A Threat Exposure Management Platform & Does Your Company Need One?

With a rise in cyberattacks, businesses must consider new ways to protect themselves. Is a Threat Exposure management platform right for you?

2024-12-03

Britain's Cyber Risk Is “Widely Underestimated” 

The UK must wake up to the severity of the cyber threat, according to the National Cyber Security Centre, as its new Director speaks on the record.

2024-12-03

Artificial Intelligence Steps Into The Boardroom

Business leaders won’t be happy to use AI in the boardroom before they understand how the apparent risks are being mitigated. By Nail & Whittaker

2024-12-03

US Citizen Jailed For Cyber Espionage

A US citizen has been sentenced to jail for spying and sharing sensitive information about his employers with China's domestic intelligence agency.

2024-12-03

Iranian Hackers Are Exploiting LinkedIn

SnailResin: A fake recruitment campaign targeting LinkedIn users working in the aerospace industry used to deliver elusive malicious malware.

2024-12-03

Four Evolving Trends Every Business Leader Should Be Aware Of

Cybersecurity In 2025: Companies really need to embrace best practices & build strong foundational security policies to stay ahead. By Luke Dash

2024-12-02

Attacks On The US From China Increasing

Critical Infrastructure: Chinese cyber attacks form part of a broader strategy to disrupt US operational capabilities in the event of conflict. 

2024-12-02

Is Zero Trust The Future Of Cybersecurity?

A zero-trust architecture is especially effective for organizations that use cloud applications and have lots of remote workers and locations.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The Hacker News (THN)

The Hacker News (THN)

THN is a leading source for Information Security, Hacking News, Cyber Security, Network Security with in-depth technical coverage of issues and events

Interpol

Interpol

Interpol is the world’s largest international police organization. It is committed to the global fight against cybercrime, as well as tackling cyber-enabled crimes.

Indium Software

Indium Software

Indium Software is an Independent Software Testing Company offering software testing services (including security testing) and offshore Quality Assurance solutions.

Inogesis

Inogesis

Inogesis helps blue-chip organisations harness disruptive technologies and thinking to drive new revenues or overcome challenges by connecting them with dynamic small companies.

BlueFiles

BlueFiles

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing.

CSC Digital Brand Services

CSC Digital Brand Services

Our brand protection and security expertise give our customers peace of mind that no matter how fast the digital world changes, their intellectual property and digital assets will be secure.

Componolit

Componolit

Componolit GmbH is a highly specialized company with a strong emphasis on trustworthy software, component-based systems and formal verification.

GuardDog.ai

GuardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

Phriendly Phishing

Phriendly Phishing

Phriendly Phishing offers phishing awareness training programs designed to ward off potential security threats and minimise the impact of cyber attacks.

AuthMind

AuthMind

Prevent your next identity-related cyberattack with the AuthMind Identity SecOps Platform. It works anywhere and deploys in minutes.

BluTinuity

BluTinuity

BluTinuity is a premier management consulting firm with a passion for information security, business continuity, incident response, disaster recovery, and HIPAA security.

CyberAntix

CyberAntix

CyberAntix offers Premium CyberSecurity for your business using an advanced Security Operations Centre technology and process platform reinforced by a steadfast and expert SOC team.

Vonahi Security

Vonahi Security

Vonahi Security is a cybersecurity SaaS company that pioneered automated network penetration testing.

SSL2BUY

SSL2BUY

SSL2BUY is a leading SSL certificate provider, authorized to sell top CA brands like Comodo, DigiCert, GlobalSign, Thawte, GeoTrust and more.

Seiber

Seiber

Seiber are a UK based Cyber Security company who provide consultancy and training services. Our objective is to stop bad things happening to good people.

FSP

FSP

FSP is a leading consultancy specialising in Digital, Security and AI solutions. We navigate the complexities of data sensitivity, confidentiality, governance and compliance.