FREE TO VIEW


« Back to News

2025-03-19

Exploring The Growing Popularity Of Data Security Posture Management

Decoding DSPM: A security model that protects data directly, instead of securing the environment in which data is housed, moved or processed.

2025-03-19

Protecting Business From The Infostealer Threat

Infostealers are an ever-growing threat, with cybercriminals finding new ways to harvest credentials & infiltrate corporate networks. By Joel Rennich

2025-03-18

Geopolitics, Nation-State Hackers & Cyberwar

As geopolitical tensions are rising, state-sponsored hackers are intensifying their efforts, targeting defence & government institutions.

2025-03-14

Patented Technology For Secure Banking

Global Collaborations Engine: Lloyds Banking Group has received a patent for its cyber security technology tool, designed to remove false positives.

2025-03-18

Amazon Launches A Quantum Semiconductor Chip

Cat Qubits: Named Ocelot, the chip aims to deal with one of the major problems for quantum computer development - to make them error free.

2025-03-18

Guidance Is Coming, But Hackers Aren’t Waiting

Supply Chain Risks: Indirect access points through suppliers are an attractive vector for cybercriminals and it needs a solution. By Ed Bartlett

2025-03-17

From Static Defenses To Dynamic Systems

Resilience isn’t just about enduring threats - it’s about maintaining the ability to operate and recover under any circumstances. By Engin Kirda

2025-03-17

Medusa Ransomware Attacks Focus On Critical Infrastructure

Double Extortion: Even if the victim organisation can recover their encrypted files, they still face the threat of their sensitive data being leaked.

2025-03-14

Shadow IT In Remote Work

Portable Storage: Businesses that fail to address shadow IT risk losing control of their sensitive data and put themselves at risk. By Jon Fielding

2025-03-17

What Apple's Standoff With The UK Government Means For Your Data

Privacy On The Line: Creating a lawful mechanism for backdoor access means creating risks for everyone else. By Paul Holland

2025-03-16

Continuous Cybersecurity Learning Is Business-Critical

Security has shifted from IT mandate to executive imperative, this is why continuous learning is a business-critical function. By Alexia Pedersen

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ControlScan

ControlScan

ControlScan is a Managed Security Services Provider (MSSP) - our primary focus is protecting your business and securing your sensitive data.

Cyber Command

Cyber Command

Our Managed IT service allows clients to offload the management of day-to-day computer, server, and networking support to our team of professionals.

CTR Secure Services

CTR Secure Services

CTR Secure Services provides a broad range of security consulting services from asset protection to cyber security.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

Adzuna

Adzuna

Adzuna is a search engine for job ads used by over 10 million visitors per month that aims to list every job everywhere, including thousands of vacancies in Cybersecurity.

ITsMine

ITsMine

ITsMine’s Beyond DLP solution is a leading Data Loss Prevention solution used by organizations to protect against internal and external threats automatically.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Incognia

Incognia

Incognia have created a ubiquitous private identity based on location behavior, that enables a personalized frictionless experience with mobile apps and connected devices.

Security BSides Cayman Islands

Security BSides Cayman Islands

Security BSides is a non-profit, community-driven event built for and by information security community members. Our aim is to help build an Information Security community in the Cayman Islands.

Avrem Technologies

Avrem Technologies

Avrem Technologies is a business IT and cybersecurity consulting firm. We design, implement, manage and monitor the networks, servers, computers and software that our clients rely on each day.

Fairdinkum Consulting

Fairdinkum Consulting

Fairdinkum is a leading full-service IT consulting firm with more than two decades of experience in the industry.

Anura

Anura

The world’s most accurate ad fraud solution protects your web assets by eliminating bots, malware and human fraud, ensuring your content is seen by real people.

CloudDefense.AI

CloudDefense.AI

CloudDefense.AI is an industry-leading multi-layered Cloud Native Application and Protection Platform (CNAPP) that safeguards your cloud infrastructure and cloud-native apps,

ARGOS Cloud Security

ARGOS Cloud Security

ARGOS aims to simplify and strengthen cloud security, by creating a visual map of security vulnerabilities, to your priceless information stored in any cloud provider environment.

Canary Technology Solutions (Canary IT)

Canary Technology Solutions (Canary IT)

A Cloud, Cyber Security, Retail Solutions and Managed IT Services provider for over 25 years, we safeguard and revolutionise business through technology and foresight.