News

2021-10-12

How To Use Transit Gateways To Monitor Traffic

Transit gateways are a way of managing traffic via different Virtual Private Clouds and AWS accounts, making them much easier to use. By Emily Henry

2021-10-12

Google’s DeepMind Faces Legal Action Over Data Misuse

DeepMind admits that it concentrated on building tools for clinicians, rather than thinking about protecting the privacy and other needs of patients.

2021-10-13

Don't Click On Pop-Ups

Dark Patterns are website design methods intended to collect more information and extract more cash than users intend by exploiting cookies.

2021-10-11

Britain's COVID - Driven Online Crime Wave

A recent survey reveals over 15 million (29%) of Britons feel unsafe online and 21% report they have been a victim of online identity theft.

2021-10-11

Massive Twitch Data Breach

Amazon's game-streaming platform Twitch, with 30m daily visitors, has been hacked, losing confidential company and user data.

2021-10-11

Career Opportunities: Top 10 Cyber Security Jobs & Salaries

Australia's fast growing cyber security industry offers prosperous careers to both graduates & experienced professionals at all levels.

2021-10-08

Using Artificial Intelligence To Fight Cancer

AI can help doctors make correct treatment decisions, reduce unnecessary surgeries and help oncologists improve cancer treatment plans.

2021-10-07

Leaked Facebook Documents Reveal Discriminatory Practices

Celebrities, politicians and high-profile Facebook users have different rules governing what content they can post, compared to 'ordinary' users.

2021-10-06

Ransomware Is The Number One Threat

Over one-third of organisations worldwide have experienced a ransomware attack targeting access to systems or data in the previous 12 months

2021-10-07

Inventive Ransomware Group Focused On Healthcare Data

With sensitive patient data and other vital information, healthcare services are often more likely to pay the ransom rather than risk exposure. 

2021-10-06

Facebook Weakens Democracy & Harms Children

A former Facebook product manager tells US lawmakers the tech giant's apps "harm children, stoke division and weaken our democracy".

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

GSMA - IoT Security Guidelines

GSMA - IoT Security Guidelines

GSMA has created a set of security guidelines for the benefit of service providers who are looking to develop new IoT products and services.

Subex

Subex

Subex leverages its award-winning telecom analytics solutions in areas such as Revenue Assurance, Fraud Management, Asset Assurance and Partner Management, and IoT Security.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

DataArt

DataArt

DataArt is a global technology consultancy that designs, develops and supports unique software solutions. Areas of activity include software security testing.

ISA Security Compliance Institute (ISCI)

ISA Security Compliance Institute (ISCI)

ISCI, a not-for-profit automation controls industry consortium, manages the ISASecure™ conformance certification program for industrial automation and control systems.

Cutting Edge Technologies (CE Tech)

Cutting Edge Technologies (CE Tech)

CE Tech is a Next Generation Technology Partner providing advanced technology infrastructure solutions through partnerships with leading technology providers.

TransUnion

TransUnion

TransUnion is a global information and insights company that makes it possible for businesses and consumers to transact with confidence.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

RealTyme

RealTyme

RealTyme is a secure communication and collaboration platform with privacy and human experience at its core.

Park Place Technologies

Park Place Technologies

Park Place Technologies' mission is to drive uptime, performance and value for critical IT infrastructure.

KATIM

KATIM

KATIM is a leader in the development of innovative secure communication products and solutions for governments and businesses.

Xobee Networks

Xobee Networks

Xobee Networks is a Managed Service Provider of innovative, cost-effective, and cutting-edge technology solutions in California.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Adaptiva

Adaptiva

Adaptiva, the autonomous endpoint management company, delivers the fastest way to patch and manage endpoints at scale.