FREE TO VIEW


« Back to News

2024-02-14

Build an Effective Endpoint Detection and Response Strategy

Ready To Simplify Your Endpoint Security? Discover how you can safeguard your AWS environment with tools available in AWS Marketplace.

2024-02-14

Flight App Vulnerability Could Enable Skyjacking

Hackers Could Hijack Flights: In an increasingly technology-focused world, aviation security is becoming a critical problem. 

2024-03-04

Prioritising Data Privacy & Security

The Most Valuable Assets: Every piece of information holds value and must be shielded from prying eyes and malicious intent. By Jacques du Preez

2024-02-09

Facebook Changed the World

Global Social Impact: By monetising its users' personal data, Facebook proved that collecting our likes and dislikes is extremely lucrative.

2024-02-13

Outsourcing Production Risks Productivity

An IT department often needs to find a quick solution when a large number of users are impacted by an operational emergency. By Matt Lorentzen

2024-02-13

The US Makes Robocalls Illegal

With major national elections pending in the major democracies around the world, the US FCC regulator has outlawed AI-generated phone calls.

2024-02-13

Chinese Hackers Operated Undetected In Critical US Networks

The Chinese state-sponsored hacking group Volt Typhoon has been embedded in critical US infrastructure networks for at least five years.

2024-02-13

DDoS Attacks In Poland Have Spiked As New Government Takes Office

Damaging Hacktivist Activity: Politically motivated DDoS attacks on public services across several critical sectors have spiked following elections.

2024-02-12

Imran Khan Claims Victory Using AI Generated Video

Pakistan Election Turmoil: The imprisoned political leader appeared on an AI generated video to claim virtual victory following an Internet shutdown.

2024-02-12

Static Application Security Testing: Trends & Predictions For 2024

SAST: Finding security vulnerabilities in source code early in the development lifecycle, makes it easier and cheaper to fix any issues.

2024-02-09

Pakistan Mobile Internet Is Cut Off On Election Day

Law & Order: Pakistan's government has shut down mobile calls and data services as millions of people go to the polls to vote for a new government.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Hitachi ID Systems

Hitachi ID Systems

Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management and password management solutions.

SecureNow Insurance Broker

SecureNow Insurance Broker

SecureNow is a commercial insurance broker based in India. Services offered include Cyber Risk insurance.

Dracoon

Dracoon

DRACOON is market leader in the German-speaking region for secure enterprise file sharing.

Information System Authority (RIA) - Estonia

Information System Authority (RIA) - Estonia

RIA ensures the interoperability of the state’s information system, organises activities related to information security, and handles security incidents in Estonian computer networks.

Dualog

Dualog

Dualog provides a maritime digital platform which ensures that services work reliably and securely onboard.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

Winmill Software

Winmill Software

Winmill is a technology services company that provides expert consulting services in Application Development, Application Security and Cyber Security.

Cranium

Cranium

AI is being implemented into every business process, but nobody knows whether their AI is secure. Our mission is to deliver security and trust to the AI revolution.

Crygma

Crygma

CRYGMA Quantum-Resistant Cryptographic Machines, the new standard in data encryption.

CloudCoCo

CloudCoCo

CloudCoCo help UK businesses of all sizes and industries succeed by providing enterprise-grade technology at small-business prices.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.

Paramount Defenses

Paramount Defenses

Paramount Defenses have unrivaled capability in two of the most critical areas in cyber security today – Active Directory Security and Privileged Access.

Nordic Defender

Nordic Defender

Nordic Defender is the first crowd-powered modern cybersecurity solution provider in the Nordic region.

Redinent Innovations

Redinent Innovations

Redinent is a cutting-edge IoT Security platform that offers precise security posture analysis and delivers actionable intelligence, empowering businesses to operate with unrivaled resilience.

CNNECT

CNNECT

CNNECT are specialists in cloud, collaboration and cybersecurity, constantly evolving the way in which we understand, advise and deploy these technologies