NEWS > Cybersecurity News


« Back to News

2023-09-04

How To Combat Cyber Security Burnout

Burnout Syndrome Is Real: Stop this happening to your cyber security team by automating and consolidating technologies. By Diana Harter

2023-09-01

Seiko Attacked By BlackCat

The Seiko electronics company has been hacked by the BlackCat cyber crime group, who have published stolen data as an extortion threat.

2023-08-31

Duolingo Leaks The Data Of 2.6 Million Users

Personal Data Scraped From An Exposed API: One of the largest online language learning sites in the world has fallen victim to a data breach.

2023-08-29

Undetected Attackers Could Be Inside Your IT Systems Now

The starting point for cyber criminals is to find a way into a target’s network - in the majority of cases that begins by exploiting a human error.

2023-08-29

NIS2 Regulations Are Coming – Are You Ready?

EU Network & Information Security Rules: Tighter rules and tougher sanctions will apply to more organisations than before. By Graham Hawkey

2023-08-23

Identifying & Analysing Emerging Cloud Threats

The sheer speed and scope of the cloud native environment demands smarter decisions when prioritising limited resources. By Nurit Bielorai

2023-08-23

Major Sporting Events Are Open Targets

The State Of Play: Microsoft and the NCSC identify major sporting events, organisations and venues as increasingly vulnerable to cyber attack.

2023-08-29

Cyber Security Firm Dragos Targeted By Hackers

An unsuccessful attempt to extort one cyber security firm involved not merely a risk to data security, but a very personal threat to the CEO's family.

2023-08-29

Understanding Generative AI

The potential of Generative AI to revolutionise content creation makes it important to understand what is, how it’s being used and by whom.

2023-08-29

Numerous Organisations Are Banning ChatGPT

A Permanent Ban: Fears around the potential misuse of generative AI tools such as ChatGPT are spreading among IT decision makers.

2023-08-16

The UN Cybercrime Convention Could Help & Harm Victims

The proposed UN cybercrime convention has both risks & opportunities for protecting vulnerable groups. By Isabella Wilkinson & Amrit Swali

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cambray Solutions

Cambray Solutions

Cambray Solutions specializes in locating and securing technical professionals, managers, and executives.

Ground Labs

Ground Labs

Ground Labs is a security software company dedicated to making sensitive data discovery products that help organisations prevent sensitive data loss.

Prim'X Technologies

Prim'X Technologies

Prim'X Technologies provides information protection solutions to prevent unauthorised access to sensitive data.

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

Miratech

Miratech

Miratech is a global IT services and consulting organization offering a full range of IT infrastructure solutions and services including cyber security.

SMESEC

SMESEC

SMESEC is a lightweight Cybersecurity framework for protecting small and medium-sized enterprises (SME) against Cyber threats.

NJVC

NJVC

NJVC delivers IT automation, optimization and security to empower mission-enabling IT for customers with secure requirements.

Shearwater Group

Shearwater Group

Shearwater Group is an award-winning organisational resilience group that provides cyber security, advisory and managed security services to help secure businesses in a connected global economy.

SIA Group

SIA Group

SIA Group, an Indra company, combines Consulting, Systems Integration and Managed Services in four specialized business areas: Information Security, Storage, IT Management and IT Mobility.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.

BluSapphire

BluSapphire

BluSapphire is an industry-first, purpose-built, cloud-native, Hybrid XDR platform powered by AI and big data analytics.

HLB System Solutions

HLB System Solutions

HLB System Solutions: Empowering businesses with proactive IT management, consulting, security, and cloud solutions. Seamless tech for growth!

turingpoint

turingpoint

turingpoint GmbH is a tech enabled boutique consultancy. It was founded by security experts with a focus on cyber security and software solutions.

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.

ThreatMon

ThreatMon

Gain insights into emerging threats with real-time data and AI-driven analysis to stay ahead of cyber risks. Detect, analyze, and respond to threats before they happen.