News

2021-09-07

Employee Cyber Security Training Is Vital To Reduce Attacks

GoCyber: Online cyber awareness training for employees can mitigate the risk of cyber attacks on your business without disrupting the workday.

2021-09-03

FBI & CISA Advice On Ransomware Attacks

Damaging ransomware attacks often occur on holidays and over weekends with companies in the food & agricultural sector at particularly high risk.

2021-09-07

Apple Delays Scanning iPhones For Child Abuse

Plans for software capable of detecting child abuse images to be built into iPhones and iOS devices have been suspended over privacy concerns.

2021-09-07

Russian Trolls Target News Websites

A major operation to influence public opinion which saw fake comments posted on Western media in support of Russian interests is confirmed.

2021-09-07

Zero Trust - The New Standard Of Security

Perimeter-based defences, such as firewalls or signature-based antivirus software are no longer sufficient to protect networks. By Charles Griffiths

2021-10-05

Securing Hybrid Workplaces From Attack

If organisations are going to use hybrid work models successfully over the long term, then they will need to further invest in their security strategy. 

2021-09-06

Russia’s Strategy For Information Warfare

Information Warfare: Its not just about hacking devices, shutting down pipelines and stealing data. Russian strategy is more subtle and stealthy.

2021-09-03

The Cyber Security Market Is Booming

The global cyber security market size was valued at $167 billion in 2020 and is expected to grow 11% year on year for at least the next five years.

2021-09-01

Malware Attacks Target Linux-based Operating Systems

Linux operating systems are being targeted, with nearly 13m detections in 2021 H1, mostly in outdated systems running unpatched software.

2021-09-01

AWS Marketplace presents: How to integrate security into the DevOps pipeline

Thursday, September 16th | Join this webinar to learn how you can empower your developers with integrated DevOps pipeline security in AWS.

2021-08-31

Social Media Tries To Protect Afghan Users

Facebook, Twitter and LinkedIn have moved to secure the accounts of users worried for their safety under the Taliban regime in Afghanistan.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

Aptible

Aptible

Security Management and Compliance for Developers. Aptible helps teams pass information security audits and deploy audit-ready apps and databases.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

WWPass

WWPass

WWPass is a global cybersecurity company that provides password-less authentication and client-side encryption technology.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

BIG Cyber

BIG Cyber

BIG Cyber is a specialized Managed Security Service Provider (MSSP) dedicated to bringing military grade cyber security technology to the gaming industry.

FINX Capital

FINX Capital

FINX strives to solve the cybersecurity issues with its proprietary technolog, FINX SHIELD, by utilizing big data, blockchain combined with artificial intelligence.

Evanssion

Evanssion

Evanssion is a value added distributor specialized in Cloud Native & Cyber Security across Middle East & Africa.

UNS Inc.

UNS Inc.

UNS is a top services partner for multiple leaders in the global cybersecurity industry – we do business in 40 countries, including the United States, Canada, Chile, and Colombia.

Indian Cyber Security Solutions (ICSS)

Indian Cyber Security Solutions (ICSS)

Indian Cyber Security Solutions is an Enterprise Cyber Security Platforms company offering Cyber Security & Technical Education and Compliance & Penetration Testing Services.

Occentus Network

Occentus Network

Occentus Network is a telecommunications service provider specialized in High Availability Servers & managed Cloud services.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.

GAM Tech

GAM Tech

GAM Tech is a Managed IT Service Provider that serves small and medium sized businesses in Alberta, British Columbia, Ontario and Quebec.

Rite-Solutions

Rite-Solutions

Rite-Solutions is an award-winning software development, systems engineering, and information technology firm.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.