FREE TO VIEW


« Back to News

2024-11-26

Cyber Attacks On Britain's Water Supply

Across critical national infrastructure sectors, more incidents have been reported this year than ever, with drinking water one of the most affected.

2024-11-26

Taking The You Out Of USB

How Businesses Can Reduce Risk: USBs are a particular concern for air gapped networks where defence relies on segregation.  By Jon Fielding

2024-11-26

British Government Minister Predicts Russia Will Step Up Cyber Attacks 

Shut Down The Power Grid: Russia is ready to carry out cyber attacks on the UK and its NATO allies in a bid to weaken support for Ukraine.

2024-11-25

Why Insider Threats Remain The “Wild Card” In Cybersecurity

There has been a big surge in insider threat incidents, with the average cost of each occurrence now reaching $15.38 million. By Miguel Clarke

2024-11-22

Google Invests In U.S. Education With 15 New Cybersecurity Clinics

Google aims to supercharge fifteen US universities & colleges by investing $1 million in in their capacity to improve cybersecurity standards.

2024-11-25

Protecting Patient Privacy: Cybersecurity Priorities For Healthcare

Healthcare professionals & clinicians at all levels have a vital role to play in keeping hospital networks safe and patient data protected.

2024-11-22

Practice Makes Perfect For Incident Response

In any pressured situation, being practiced and prepared removes a lot of the stress and makes people more effective. By Gemma Moore

2024-11-22

Google Faces Order To Divest Chrome

Legal Remedy: A US court ruling that Chrome operates a monopoly in Inernet search may soon result in Google being ordered to sell the business.

2024-11-22

AI Can Revolutionise Science

Acceleration: AI is one of science’s greatest achievements and is now poised to revolutionise science itself in several critical areas of research.

2024-11-22

The Importance Of Cyber Security In Safeguarding E-Commerce Businesses

The stability of e-commerce platforms cannot be considered ‘one and done’ measures. They require constant vigilance & adaptability from providers.

2024-11-21

Hamas Affiliates Attacking Israel

A group named WIRTE has been identified targeting Israeli infrastructure, as well as the Palestinian Authority, Jordan, Iraq, Saudi Arabia & Egypt.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Gamma

Gamma

Gamma is a leading provider of Unified Communications as a Service (UCaaS) into the UK, Dutch, Spanish and German business markets.

Globalscape

Globalscape

Globalscape is a leader in secure data exchange solutions.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

Luxembourg Institute of Science & Technology (LIST)

Luxembourg Institute of Science & Technology (LIST)

LIST is a mission-driven Research and Technology Organisation. Areas of research include IT and aspects of IT security.

Netwrix

Netwrix

Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach.

Computer Forensics Consult (CFC)

Computer Forensics Consult (CFC)

Computer Forensics Consult provides disaster recovery, computer forensics, electronic discovery and litigation support services in the growing area of Cyber Security.

FirstPoint

FirstPoint

FirstPoint has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

Brimondo

Brimondo

At Brimondo we help you to maximize and protect your brand value by being a proactive and strategic partner within brand protection with experts within intellectual property and digital assets.

Ukrainian Academy of Cyber Security (UACS)

Ukrainian Academy of Cyber Security (UACS)

UACS is a professional non-profit public organization established to promote the development of an extensive network and ecosystem of education and training in the field of cyber security.

Security Management Partners (SMP)

Security Management Partners (SMP)

Security Management Partners (SMP) is a trusted partner to financial services, healthcare and businesses that need to manage their information, securely.

Earlybird Venture Capital

Earlybird Venture Capital

Earlybird is a venture capital investor focused on European technology innovators.

ControlMap

ControlMap

ControlMap is a software as a service platform with a mission to simplify and eliminate stress from everyday operations of modern IT compliance teams.

Truvantis

Truvantis

Truvantis is a cybersecurity consulting organization providing best-in-class cybersecurity services to secure your organization’s infrastructure, data, operations and products.

Datastream Cyber Insurance

Datastream Cyber Insurance

DataStream Cyber Insurance is designed to give SMB’s across the US greater confidence in the face of increasing cyber attacks against the small and medium business community.

The Security Bulldog

The Security Bulldog

The Security Bulldog distills and assimilates open source cyber intelligence to enable security teams to understand threats more quickly, make better decisions, and accelerate detection and response.