News

2020-03-12

Cyber Security Strategy In The Digital Age

The security posture of a company is now just as important to the CEO as it is to the CISO. Business leaders must embrace this reality.

2020-03-12

5G Will Affect Jobs In 2020

5G technology will change aspects of how we work and IT technology and business executives alike must adapt to the impact on the workplace.

2020-03-06

US Increases Pressure To Stop Huawei 5G In Britain

The US does not think the UK’s decision to allow Huawei to buy 5G technology is final and is keeping up the pressure to change its mind.

2020-03-11

Cyber Crime Methods Are Evolving

Criminals are quickly developing new tools and techniques to take advantage of changes in the ways consumer and businesses behave.

2020-03-11

The Global Cyber Security Market Will Be Worth $280b By 2027

The cybersecurity market is booming: The cyber hotspot continues to attract founders and investors alike, with 300+ new startups launching every year.

2020-02-28

WEBINAR: How to prioritize security controls for situational awareness in AWS

Thursday, March 12, 2020 | Join AWS Marketplace and Sounil Yu to discover ways to strengthen your foundational controls & security posture in AWS.

2020-02-27

McLaren F1 Racing Are Cyber Secure With Darktrace

The McLaren F1 racing team will use AI-driven cyber security technology from Darktrace to monitor on-board IoT via its cloud-based backend.

2020-02-26

Organisations Are Adopting AI For Cyber Security

Over 70% of organisations are currently testing use cases for cyber security driven by Artificial Intelligence across a wide range of applications.

2020-02-24

Hamas Hackers Use New Malware

Hamas, the Islamist political group that runs Gaza, are using new high-tech malware in campaigns against the local Palestinian Authority.

2020-03-10

The Cyber Security Workforce Must Grow 145%

Although cyber security training is increasing there remains an acute skills shortage and the expert cyber workforce urgently needs to get bigger.

2020-02-26

Cyber Security Warnings For US 2020 Election

Security experts warn that government agencies are under attack and that hackers are very likely to focus on the forthcoming US Presidential election.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Checkmarx

Checkmarx

Checkmarx provides state-of-the-art application security solutions with static code analysis software.

National Response Centre for Cyber Crime (NR3C)

National Response Centre for Cyber Crime (NR3C)

National Response Centre for Cyber Crime (NR3C) is a law enforcement agency in Pakistan dedicated to fighting cyber crime.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

Cyjax

Cyjax

Cyjax monitors the Internet to identify the digital risks to your organisation, including cyber threats, reputational risks and the Darknet.

GuardRails

GuardRails

GuardRails provides continuous security feedback that empowers developers to find, fix, and prevent vulnerabilities.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

Secure Ideas

Secure Ideas

Secure Ideas is focused on penetration testing and application security including web applications, web services and mobile applications.

Newtec Services

Newtec Services

IT should be responsive, adaptive, and smart. Now more than ever, you need a business that runs efficiently and can adapt to today's challenges. We can help with custom IT solutions.

Clear Thinking Solutions

Clear Thinking Solutions

Clear Thinking is an IT Solutions company specialising in secure & compliant technical services.

Seemplicity

Seemplicity

Seemplicity revolutionizes the way security teams work by automating, optimizing and scaling all risk reduction workflows in one workspace.

Amazon Web Services (AWS)

Amazon Web Services (AWS)

Amazon Web Services is the world’s most comprehensive and broadly adopted cloud platform, offering fully featured services from data centers globally.

LaScala

LaScala

LaScala is an IT Managed Services provider delivering technical, security, and compliance solutions with dedication, compassion, and agility.

Mindsprint

Mindsprint

Mindsprint (formerly Olam Technology and Business Services - OTBS) are a leading edge technology and business services firm.

The Hacking Games

The Hacking Games

The Hacking Games' Mission is to inspire, educate and mobilise a generation of ethical hackers to make the world a safer place.

Dial A Geek

Dial A Geek

Dial A Geek are a Bristol-based B Corp that provides Managed IT Services to companies of 20+ users. We help businesses with a smart use of tech, including compliance and cybersecurity solutions.

Efex

Efex

Efex is one of Australia’s leading Managed Technology Solutions providers. We service local companies across Australia, providing accessible, fast and straightforward IT.