FREE TO VIEW


« Back to News

2024-12-02

AI Used For Extortion & Sexual Abuse

Paedophiles, scammers, and criminal hackers are increasingly using Artificial Intelligence to attack their victims, a senior police officer warns.

2024-12-02

2025: A New Year Of Cybersecurity Challenges

Certainty Of Cyberthreats: Leaders should cultivate a culture of vigilance, encouraging employees to beware of the unexpected. By John Mutuski

2024-11-29

How AI Is Reshaping The Cybersecurity Landscape 

ChatGPT Turns Two: Generative AI has revolutionised countless industries, including cybersecurity. A discussion with Alex Rice & Darren Thomson.

2024-11-27

Cybersecurity Essentials For Laptop Gamers

Understanding the basics of cybersecurity for laptop gamers allows you to enjoy online gaming without fear of a compromised device & stolen identity.

2024-11-29

From Credentials To Identity: Understanding Digital Identity & Access

Proactive security strategies, continuous monitoring & education are key to combat the threat of credential misuse & identity theft. By Ford Merril

2024-11-27

Russian State-Sponsored Hacking Extends Worldwide

A damaging Russian espionage campaign has been striking government agencies and other institutions in Central Asia, Ukraine & NATO members.

2024-11-27

Meta Deletes 2 Million Fake Social Media Accounts 

Meta has deployed a range of measures to detect and stop fraud across its platforms, including Facebook, Instagram, WhatsApp & Messenger.

2024-11-26

What The US’s Foggy AI Regulations Mean For Today’s Cyber Compliance

The US government's regulatory inclination to let AI developers do their own thing is a growing concern for the vast majority of businesses.

2024-11-26

The Problem With Generative AI - Leaky Data

Confidential computing allows data to be input into a Gen- AI model and the data to be securely processed without leaking. By Samuel Tourbot

2024-11-23

Phishing Scheme That Generated $11M Taken Down

Scattered Spider: Charges of using text messages to extract victims' personal information as a gateway to steal millions in crypto currency.

2024-11-25

Hackers Steal $10M Via LinkedIn

North Korean hackers masquerading as recruiters for high profile financial services firms using LinkedIn to contact prospective targets.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ODVA

ODVA

ODVA is a global trade and standards development organization whose members comprise the world’s leading industrial automation companies.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

Pluribus One

Pluribus One

Pluribus One develops customized solutions and other data-driven applications to secure your business and your devices.

In-Sec-M

In-Sec-M

In-Sec-M is a non-profit organization that brings together companies, learning and research institutions, and government actors to increase competitiveness of the Canadian cybersecurity industry.

FraudWatch International

FraudWatch International

FraudWatch has been protecting client brands around the world since 2003, and are the leaders in online brand protection from phishing, malware, social media and mobile apps impersonation.

Tactical Network Systems (TNS)

Tactical Network Systems (TNS)

Tactical Network Solutions helps you discover hidden attack vectors in IoT and connected devices before someone else does.

UST

UST

UST is a global provider of digital technology and transformation, IT services and solutions including managed security services.

Swiss It Security Group

Swiss It Security Group

Swiss It Security Group offers clients complete IT security concepts based on innovative solutions and technology, with a focus on protection, detection and defence.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

Stronger International

Stronger International

Stronger International provides expert cyber services and training to organizations and individuals to enhance IT and security knowledge.

Custard Technical Services

Custard Technical Services

Custard provide Network Security for all types of businesses across many industries, helping to keep them safe and secure.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

Jot Digital

Jot Digital

Jot Digital is a full-service technology company specializing in digital engineering, application modernization and business transformation.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.

RIIG Technology

RIIG Technology

Our mission is to empower organizations with high-quality, verifiable data and advanced intelligence solutions, ensuring robust security and effective risk management.

ColCERT

ColCERT

ColCERT is the national cybersecurity emergency response team of Colombia.