FREE TO VIEW


« Back to News

2024-05-31

The Key Components Of Embedded Systems Development Services

Embedded systems development services are essential for businesses and industries seeking to leverage the power of customized & efficient systems.

2024-05-31

Safeguarding Data In The Quantum Computing Era

Quantum Apocalypse: Now is the time to start learning about existing quantum-resistant encryption technologies & solutions. By Prof. Nigel Smart

2024-05-30

Massive Breach At Ticketmaster

1.3 Terabytes Of Data Stolen: Ticketmaster has been hit by a cyber attack by the 'Shiny Hunters'. Sensitive customer data is for sale for $500k.

2024-05-30

Five AI-driven Features to Enhance Payment Gateway Security

Incorporating AI-driven features into payment gateway security frameworks is essential for staying ahead of sophisticated cyber threats.

2024-05-29

Hackers Exploit GitHub & FileZilla To Deliver Malware

Fake GitHub accounts & repositories resembling real software programs, but filled with malware, designed to access computers and steal data.

2024-05-29

Google AI Makes Embarrassing Errors

Google has attracted derision after its proprietary AI tool, Overview, produced inaccurate, in some cases bizarre, answers to user questions.

2024-05-28

Minimizing The Impact Of Human Factors In Cybersecurity Errors

The Human Factor Is A Liability: Cybersecurity is never one and done. This is a continuous effort and continuous effort always requires consistency.

2024-05-29

The Future Of Online Security: Predictions On Upcoming Cybersecurity Functions 

New Risks In The Evolving Landscape Of The Internet: Strategies for safeguarding individuals and businesses in the digital realm.

2024-05-25

OpenAI Simulate Scarlett Johansson's Voice Without Permission

'Eerily Similar': OpenAI used a voice very like that of the actress for their new GPT-4 chatbot after she turned down a request to use her real voice. 

2024-05-28

Facial Recognition Technology Defects

Misidentified: Facial recognition technology produces inaccurate results and its widespread deployment risks dangerous consequences.

2024-05-24

Staff Data Breach: British Police Could Be Fined £750k

The Police Service of Northern Ireland faces a penalty for a major data breach after mistakenly exposing names of thousands of serving officers.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

HUB International

HUB International

HUB is one of the largest insurance brokers in the world. HUB Risk Services provides the full range of expert consulting to identify risks, reduce exposure to loss and manage claims issues.

Association of Information Security Professionals (AISP)

Association of Information Security Professionals (AISP)

The Association of Information Security Professionals (AISP) represents the interests of information security professionals in Singapore.

Deltagon

Deltagon

Deltagon develops information security solutions to protect companies’ confidential information in e-communication and e-services.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

Tecnalia Research & Innovation

Tecnalia Research & Innovation

Tecnalia is the largest center of applied research and technological development in Spain, a benchmark in Europe and a member of the Basque Research and Technology Alliance.

Blue Lance

Blue Lance

Blue Lance is a global provider of cybersecurity governance solutions. Our software solutions automatically collect and store the information necessary for investigations, audit and compliance.

British Security Industry Association - CySPAG

British Security Industry Association - CySPAG

CySPAG is a special interest group within the British Security Industry Association (BSIA) focused on reducing the risk of product related cybercrime.

Cubro Network Visibility

Cubro Network Visibility

Cubro network visibility solutions remove network monitoring ‘blind spots’ to provide enhanced visibility and control of all data transiting a company’s network.

Private Client Cyber Security (PCCS)

Private Client Cyber Security (PCCS)

PCCS provides enterprise-grade cybersecurity consulting and services to professional practices, executives, athletes, and high net worth families.

Kirk ISS

Kirk ISS

Kirk ISS are the leading provider of IT services in the Cayman Islands. We offer best-in class hardware, software, communications and cloud computing, all backed by professional services support.

Web3fied

Web3fied

Web3fied is a seed stage company building the future of decentralized digital identity and credentials management.

Roberts & Obradovic Law

Roberts & Obradovic Law

Roberts & Obradovic Law Group is a corporate, privacy, employment and litigation law firm.

Hughes Network Systems

Hughes Network Systems

Hughes are industry leaders in networking technologies and services, innovating constantly to deliver the global solutions that power a connected future for people, enterprises and things everywhere.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.

Bell Canada

Bell Canada

Bell is the leading provider of network and communications services for Canadian businesses and the partner for delivering network, IoT, cloud, voice, collaboration and security solutions.

Blaze Networks

Blaze Networks

Blaze are a security-focused Managed Services Provider delivering communications and IT services to businesses across the UK.