News

2019-10-01

The WannaCry Hangover

WannaCry detections are at an all-time high and it continues to infect computers worldwide, say the security experts at Sophos.

2019-10-01

Cyber Security Experts Needed in Australia

As organisations around the build their defences against cyber threats, the demand for cyber experts in Australia has dramatically increased.

2019-12-16

IT Governance - FREE Guide

IT Governance | Download the FREE guide: Information Security & ISO 27001 – An Introduction

2019-10-01

N. Korean Hackers Attacking Cash Machines In India

DTrack: Hackers with ties to North Korea have developed a new malware variation to steal data from cards inserted into ATM machines in India.

2019-09-30

Iran Denies It Has Suffered Attacks On Its Oil Production

Iran has denied that its oil infrastructure had been successfully attacked by a cyber operation, following reports of disruptions to the sector.

2019-09-30

Top 5 Rules For Laying Out An Employee Cybersecurity Policy

Five tips to help you to develop an employee cybersecurity policy that helps your people to learn how to defend themselves. By Aimee Laurence.

2019-10-02

WEBINAR: How to perform a security investigation in AWS

Tuesday October 22 | Join SANS and AWS Marketplace for guidance on conducting efective investigations in your AWS environment.

2019-09-30

Rogue States Are Funding Stateless Hackers

Retired NSA Chief says cyber-attacks are more likely to come from criminals funded by US enemies than from the enemies themselves.

2019-09-30

Organised Social Media Manipulation

The use of computational propaganda to shape public attitudes via social media has become main-stream, far beyond the actions of a few bad actors.

2019-09-28

Huawei Will Sell Its 5G Know-How

Huawei wants to address the widespread concerns over the integrity of its 5G network technology by licensing it to EU and US competitors.

2019-09-26

Old Magecart Domains Come Back To Life

A consortium of malicious hacker groups who target online shopping cart systems known as Magecart are repurposing some old tools.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ProfitBricks

ProfitBricks

ProfitBricks is a secure cloud computing infrastructure-as-a-service (IaaS) solution.

National Agency for the Security of Information Systems (ANSSI) - France

National Agency for the Security of Information Systems (ANSSI) - France

The role of Agence Nationale de la Sécurité des Systèmes d'Information (ANSSI) is to foster a coordinated, ambitious, pro-active response to cybersecurity issues in France.

MSG Systems

MSG Systems

MSG are committed to intelligent IT and industry solutions and offer independent consulting on all aspects of information security.

Heimdal Security

Heimdal Security

Heimdal Security provides proactive protection against cyber threats including ransomware, exploit kits and financial malware.

Decision Group

Decision Group

Decision Group are a Total Solution Supplier offering Network Forensics and Lawful Interception tools.

Clearswift

Clearswift

Clearswift is trusted by businesses, governments and defense organizations globally for its Adaptive Cyber Security and Data Loss Prevention solutions.

AVL Mobile Security

AVL Mobile Security

AVL Mobile Security is a market-leading mobile security company for anti-virus and threat intelligence in the mobile Internet.

Private Internet Access

Private Internet Access

Private Internet Access is a Virtual Private Network services provider offering secure encrypted access to the internet.

Fingerprint Cards

Fingerprint Cards

Fingerprint Cards develops and produces biometric components and technologies that verify a person’s identity through the analysis and matching of an individual’s unique fingerprint.

Cyber Security & Cloud Expo

Cyber Security & Cloud Expo

The Cyber Security & Cloud Expo is an international event series in London, Amsterdam and Silicon Valley.

CYRail

CYRail

CYRail project will analyse threats targeting Railway infrastructures and develop innovative attack detection and alerting techniques.

GCHQ Apprenticeships

GCHQ Apprenticeships

GCHQ, the UK intelligence and security organisation, offers a unique three-year Cyber Security Degree Apprenticeship with employment on successful completion.

TalaTek

TalaTek

TalaTek is a full-service risk management firm providing expert services in risk management, cybersecurity, and compliance.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

CYMAR

CYMAR

CYMAR The “CYBER” Smart Solution to offer sustainability and bring resilience to Global SMART Terminals and protect the supply chain of the World’s economy.

NetHope

NetHope

NetHope is a membership-based organization serving the international nonprofit humanitarian, development, and conservation sector through digital transformation.