News

2022-06-09

Data Breaches & Identity Theft: Is Your Online Classroom Secure?

Bugs, Viruses & Identity: Three common security problems in the online classroom and the remedial measures to deal with them. By Diane Wong

2022-06-29

Human Brain Changes With Digital Technology & Implants

Research on the brain-health consequences of digital technology is showing how devices & software can both help and harm brain function. 

2022-06-10

Penetration Testing For An Effective Cyber Security Defence

Penetration Testing: A simulated attack to identify the weak spots in an IT system's defences which attackers could take advantage of.

2022-06-09

Artificial Intelligence Will Change The Future Of The World

The continued rapid development of technology, plus research in quantum computing, gives AI the potential to evolve at high speed.

2022-06-24

Preventing Exploitation Of Digital Images Of Children

Digital Fingerprints: Online mages of child sexual abuse are a daunting challenge for practitioners working in the field of child sexual abuse.

2022-06-21

Social Media Platforms Must Protect Women Online

The British regulator says women are heavier users of social media platforms than men and is urging technology firms to keep women safer online.

2022-06-21

US Military Hackers At Work Supporting Ukraine

Keyboards Preferred To Missiles: Cyber Command chief confirms that US keyboard warriors are helping Ukraine in its war against Russia.

2022-07-01

EnemyBot Malware Targets Web Servers

Rapidly evolving IoT malware which targets content management systems, web servers and Android devices is freely available on GitHub.

2022-06-08

Global Cyber Security Insurance Market Will Grow To $61.2B

Growing security threats and financial losses are expected to push the market for cyber security insurance to US$ 61.2 Billion by the end of 2032.

2022-06-08

Small Business Still Not Ready For Cyber Attacks

Despite repeated warnings, it looks like US small businesses are failing to take any new steps to reduce their risk from the threat of cyber attacks.

2022-06-08

Iran Caught Using Intermediaries To Hack Israeli Business

'Polonium' Hacker Group: Iran is using third parties to carry out cyber operations on their behalf to target Israeli banking and defence sectors.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

SABSACourses

SABSACourses

SABSA is a development process used for solving complex problems such as IT Operations, Risk Management, Compliance & Audit functions.

Quantivate

Quantivate

Quantivate is a provider of web-based Governance, Risk, and Compliance (GRC) software and service solutions.

Daon

Daon

Daon offers a universal biometric authentication platform for mobile devices.

Cyber Security & Information Systems Information Analysis Center (CSIAC)

Cyber Security & Information Systems Information Analysis Center (CSIAC)

CSIAC is chartered to leverage best practices and expertise from government, industry, and academia on cyber security and information technology.

SailPoint

SailPoint

SailPoint provides identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.

Learning Tree International

Learning Tree International

Learning Tree's comprehensive cyber security training curriculum includes specialised IT security training and general cyber security courses for all levels of your organisation including the C-suite.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

Aptible

Aptible

Security Management and Compliance for Developers. Aptible helps teams pass information security audits and deploy audit-ready apps and databases.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

GRSi

GRSi

GRSi deliver next-generation systems engineering, cybersecurity, technology insertion and best practices-based Enterprise Operations (EOps) management.

Panther Labs

Panther Labs

Panther’s mission is to make security monitoring fast, flexible and scalable for all security teams.

VectorRock

VectorRock

Save Your Business From Cyber Criminals. We specialize in uncovering cyber risks which threaten your organization and fixing them.

LegalByte

LegalByte

LegalByte is a leading provider of comprehensive legal and forensic services dedicated to addressing the complex challenges of the digital age.

Hartman Executive Advisors

Hartman Executive Advisors

Hartman Executive Advisors is an unbiased IT and cyber advisory firm uniquely designed to help mid-market executives maximize their IT investments.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.

Nexio

Nexio

We are Nexio. We help organisations take every NEXT step toward their accelerated digital transformation.