FREE TO VIEW


« Back to News

2024-08-06

Modern Britain: Disinformation On Social Media Inflames Anti-Immigration Riots

Algorithms sending fake news across social media have generated a chain reaction of anger leading to riots, following the murder of three children.

2024-04-18

Penetration Testing Explained [extract]

A Penetration Test (Pen Test) is an authorised simulated attack performed on a computer system to evaluate its security, with authorised permission.

2024-04-22

Important Differences Between Different Types Of Artificial Intelligence [extract]

AI researchers are rapidly developing expert systems for solving a wide range of complex problems, using different techniques & methodology.

2024-06-13

Protecting Data In The Remote Working Era [extract]

Long Term Trend: Regular training & guidance will ensure that remote workers are equipped to do everything they can to keep company data safe.

2024-06-28

Russia’s Nation-State Hackers: A Serious Threat To Global Security [extract]

Russian hacking grabbed attention as a potential threat to free elections, national security, water systems, and even social stability.

2024-06-14

Elections 2024 - Fake News & Misinformation [extract]

Preserving The Integrity Of The Vote: The ready availability of AI text and image generators has greatly increased the threat to democracy.

2022-12-28

Cyber Security Awareness Training For Management & Employees [extract]

What You Can Do Right Now: Businesses are facing unprecedented economic pressures - a cyber attack is the last thing any organization wants.

2024-07-15

A Brief History Of Cyber Crime [extract]

With advances in technology inevitably come heightened risks with cybercrime, which has exploded to become the most active form of crime globally.

2024-08-06

Building Resilience In A Changing Cyber Threat Landscape

Minimising Attacks: Businesses need to arm themselves with AI-enabled defences that are stronger than AI-enabled threats. By Duncan Bradley

2024-08-04

Millions Of US Voters Exposed Online

The exposed databases contained documents with lists of 4.6m available or active voters, absentees, early mail-in voting records & duplicate voters. 

2024-08-05

The Paris Olympics: More Than Just Gold Medals Are At Stake

Liberty, Equality, Security: The Games are a major target for cyber criminals, who see an opportunity to cause major disruption. By Steve Bradford

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

Cyverse

Cyverse

Cyverse is a cyber-security firm which provides corporations with state-of-the-art cyber-security service-based and technological solutions made in Israel.

Calero Software

Calero Software

Calero is a leading global provider of Communications and Cloud Lifecycle Management (CLM) solutions designed to simplify the management of voice, mobile and other unified communications services.

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

TechBeacon

TechBeacon

TechBeacon.com is a digital hub by and for software engineering, IT and security professionals sharing practical and passionate guidance to real-world challenges.

Q-Net Security

Q-Net Security

Protect your critical networks. Q-Net Security make hardware that provides the strongest drop-in security for your existing critical infrastructure.

GuardDog.ai

GuardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Elba

Elba

Employee security needs to be reinvented. SaaS security needs to involve end-user and awareness needs to be actionable. Meet elba, the 5-in-one cybersecurity hub with no compromises.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.

Sri Lanka CERT

Sri Lanka CERT

Sri Lanka CERT is the National Centre for Cyber Security, which has the national responsibility of protecting the nation’s cyberspace from cyber threats.

Eficens Systems

Eficens Systems

Eficens Systems is a global IT services and consulting company. We specialize in empowering businesses to harness the potential of Information Technology as a strategic asset.

Nightwing

Nightwing

Nightwing is the intelligence services company that continually redefines the edge of the possible to keep advancing our national security interests.

Unosecur

Unosecur

Unosecur is a comprehensive identity security platform that addresses identity-related threats in multi-cloud and on-premise environments.

Platview Technologies

Platview Technologies

Platview Technologies is an innovative and agile cybersecurity company with the goal of safe-guarding businesses with our world-class, industry-leading services and technology solutions.