News

2022-12-30

Critical Infrastructure: A Flashing Beacon For Cybercrime

Cybercriminals are fully aware of the impact of disruption on vital services, not just financially, but on public confidence. By Deryck Mitchelson

2022-12-29

US Bans Government Users From Using TikTok

The Senate has passed a bill that bans federal employees from using the Chinese-owned TikTok app on devices provided by the government. 

2022-12-29

France Fines Microsoft For Privacy Breaches

Fined $64 Million: Microsoft's search engine Bing was operating with a system that did not allow users to easily get out of cookie collection.

2022-12-29

Four Major Cyber Attacks In 2022: How To Not Repeat History In 2023

High Profile Attacks On Twitter, Medibank, Optus & Ronin: How can tools such as Attack Surface Management prevent hacking from taking place?

2022-12-28

Ukraine’s Military Intelligence Hit By Cyber Attacks

Battlefield Awareness: Ukrainian security services confirm that its Delta military intelligence system has been hit by cyber attacks.

2022-12-28

Cyber Security Awareness Training For Management & Employees

What You Can Do Right Now: Businesses are facing unprecedented economic pressures - a cyber attack is the last thing any organization wants.

2022-12-27

Preventing Insider Threats In Kubernetes Clusters

Secure Your Kubernetes Clusters From Inside Threats. The basics of insider threats and how to prevent it in Kubernetes. By Gilad David Mayaan

2022-12-23

Irish Health Service Ransom Attack Will Cost Ireland As Much As €100m

A malicious Excel file attached to a phishing email which resulted in an IT systems shutdown has caused €80 million in damages and counting.

2022-12-22

Guardian Newspaper Suffers A Large Scale Ransomware Attack

IT Systems Hacked: Guardian newspaper employees have been told to work from home following a serious incident affecting network connectivity.

2022-12-22

Malaysian Airline Ransomware Attack

The Daixin Team hacking group has claimed responsibility for stealing the personal data of five million passengers & employees of AirAsia.

2022-12-22

Britain’s Free Cyber Security Service

Email Security Check: A new service to help organisations identify vulnerabilities that can let hackers spoof emails or create email privacy breaches.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Arista Networks

Arista Networks

Arista Networks is an industry leader in data-driven, client to cloud networking for large data center, campus and routing environments.

QNAP Systems

QNAP Systems

QNAP Systems, Inc. delivers world class network attached storage (NAS) and network video recorder (NVR) solutions.

_cyel

_cyel

_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system.

Ledger

Ledger

Ledger is a leader in security and infrastructure solutions for cryptocurrencies and blockchain applications using its proprietary technology.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

Selectron Systems

Selectron Systems

Selectron offers system solutions for automation in rail vehicles and support in dealing with your railway cyber security challenges.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

LogicalTrust

LogicalTrust

LogicalTrust security testing specialists find the weakest points in your company and show you how to fix them step-by-step, as well as how to improve your security.

Onesecure Asia

Onesecure Asia

ONESECURE Asia’s expertise and services are built around its mission to provide reliable, robust and scalable technology solutions to cater for its customers’ needs.

Axiado

Axiado

Axiado Corporation is a security processor company redefining hardware root of trust with hardware-based security technologies, including per-system AI.

Xceptional

Xceptional

Xceptional is a multi-award-winning technology services firm that celebrates the unique strengths of people with autism.

Castlepoint Systems

Castlepoint Systems

Castlepoint Systems is a pioneer in information governance, risk and compliance as a service. An all-in-one solution offering powerful risk management, built in compliance, cybersecurity and audit.

BJSS

BJSS

BJSS is an award-winning technology and engineering consultancy for business.

Secur-Serv

Secur-Serv

Secur-Serv is a security-first managed services provider. We provides Managed IT, Managed Print, Managed Device, and Cybersecurity services to companies of every size.

AppSOC

AppSOC

AppSOC is a leader in Application Security Posture Management (ASPM) and Code-to-Cloud Vulnerability Management.