FREE TO VIEW


« Back to News

2023-11-09

British Online Safety Act Is Now Law

Reducing Harmful Social Media Content: A zero-tolerance approach to protecting children while giving adults more choices over what they see online.

2023-11-11

Attack On Chinese Bank Disrupts Financial Trading

The Ripple Effect: An attack on a major Chinese bank has resulted in disruption and completion failures in trades on US financial markets.

2023-11-12

Global Law Firm Breached & Data Stolen

International law firm Allen & Overy has disclosed it suffered a “data incident” resulting from an attack by the prolific LockBit ransom group. 

2023-11-10

Halting The Rise Of Ransomware

How Zero Trust Can Mean Zero Loss: Encryption & backups are critical to taking the sting out of hackers’ ransom demands. By John Michael

2023-11-09

Securing Kubernetes Helm: Vulnerabilities & Defensive Strategies

Kubernetes is becoming part of the mainstream IT landscape, used to run mission critical workloads both on-premises and in the cloud. 

2023-11-08

Time To Get Serious About Defence

Once sensitive data has been stolen its confidentiality is lost forever - that’s why a proactive approach is so important. By Gavin Millard

2023-11-02

Major Outage: British Library Suffers A Cyber Attack

Education In The Crosshairs: Research centres across the UK are facing attacks from cyber criminals - Britain's national library is the latest victim.

2023-11-02

Ransomware Attacks Hit A Record High

It's not just criminals who want to get your personal information for financial gain. Many popular Apps are legitimately scraping your personal data.

2023-11-07

Online Conflict In Gaza & Ukraine

The use of cyber warfare techniques has fast become integral to the Gaza conflict, adding a layer of complexity to an already difficult situation. 

2023-11-03

Bletchley Declaration On Artificial Intelligence Gets International Support

Regulating AI: An international declaration to address risks with the technology, as well as a multilateral agreement to test advanced AI Models.

2023-11-07

Five Critical Security Measures To Enforce API Security 

Application Programming Interfaces are popular targets for attack - proper attention to security & governance can reduce your risk. By Marco Palladino 

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TenIntelligence

TenIntelligence

TenIntelligence provides due diligence, brand protection and fraud investigation services including digital forensics.

Forensic Control

Forensic Control

Forensic Control specialise in providing simple & straightforward Cyber Security to organisations, helping them assess, prevent and respond to cyber threats.

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

BeOne Development

BeOne Development

BeOne Development provide innovative training and learning solutions for information security and compliance.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

Acalvio Technologies

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.

IBA Security

IBA Security

IBA Security is a center of competence consolidating the cybersecurity expertise of the IBA Group.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

Quantea

Quantea

Our multi-patented solutions - QP Series Network Analytics Accelerator appliance and PureInsight Analytics Software Suite allows you to capture, analyze, store, replay, network traffic data.

Kickstart

Kickstart

Kickstart supports your startup in scaling deep technology businesses in Switzerland in areas such as AI, Blockchain and Cybersecurity.

DeVry University - Cyber Security Degree

DeVry University - Cyber Security Degree

Explore the dynamic world of data protection with a hybrid or online cyber security degree specialization with DeVry's IT & Networking Bachelor's Degree.

Bytes Technology Group

Bytes Technology Group

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

Dynamic Standards International (DSI)

Dynamic Standards International (DSI)

Dynamic Standards International is a global standards development organization which develops certifiable ‘dynamic standards’ that pace with fast-evolving landscapes.

Ridgeline International

Ridgeline International

Ridgeline helps organizations manage digital risk through data privacy and secure infrastructure solutions.