News

2017-07-12

Australia’s Sharp Turn To Information Warfare

The Australian government responds to regional threats and moves towards the defence concept of 'information dominance'.

2017-07-12

Islamic State On The Internet

Project TENSOR: British police working on improving methods of detecting terrorist content

2017-07-11

Insurance: How Cyber Risks Are Evolving

Lloyds of London say that both the costs and the ways in which companies can be targeted by organised cyber criminals are increasing.

2017-07-11

Self- Drive Vehicle Are Confused by Kangaroos

Volvo's self-drive system can identify and avoid deer, elk and caribou, but testing in Australia shows it cannot adjust to kangaroos.

2017-07-11

Ukrainian Security Call in FBI, NCA & Europol

Ukraine's SBU security service calls in international help & has branded the hugely damaging Petya attack an “act of cyber-terrorism”.

2017-07-10

Fraud And The Internet of Things

Cyber criminals have the funding and resources to infect millions of IoT gadgets with disruptive and potentially hazardous mechanisms.

2017-07-10

Trump’s Joint Cybersecurity Unit With Russia – It’s Not Happening

Reverse Gear: Plans for a joint cyber unit brought immediate ridicule amid concerns it was a Russian ruse to collect secrets.

2017-07-10

GCHQ Unveils Its Cybersecurity Playbook

The UK National Cyber Security Center has created four “simple and free measures” that public sector bodies can implement immediately.

2017-07-10

Prices For Stolen NSA Exploits Go Higher

Both Petya and Wannacry are strains of malware derived from NSA exploits stolen by the mysterious Shadow Brokers. Now they want more money.

2017-07-10

Fallout From Petya On Global Shipping

Petya shows the scale of the damage a computer virus can unleash on a technology dependent and inter-connected industry.

2017-07-07

India Wants A Big Windows Discount From Microsoft

75% Off: With 57 million computers in India, the country could save billions of dollars in costs if Microsoft agrees to the steep discount.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Zybert Computing

Zybert Computing

Zybert Computing provide server solutions with built-in security and information protection features for the SME market.

MetricStream

MetricStream

MetricStream provide integrated GRC solutions across business, IT, and security functions.

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

BlackBerry Security Services

BlackBerry Security Services

Blackberry provides intelligent security software and services to enterprises and governments around the world.

Computing Technology Industry Association (CompTIA)

Computing Technology Industry Association (CompTIA)

CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy.

Dark Cubed

Dark Cubed

Dark Cubed is an easy-to-use cyber security software as a service (SaaS) platform that deploys instantly and delivers enterprise-grade threat identification and protection at a fraction of the cost.

Innosphere Ventures

Innosphere Ventures

Innosphere Ventures is Colorado’s leading science and technology incubator, accelerating the success of high-impact startup and scaleup companies.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

Communications & Information Technology Regulatory Authority (CITRA)

Communications & Information Technology Regulatory Authority (CITRA)

CITRA is responsible for overseeing the telecommunications sector, monitoring and protecting the interests of users and service providers, and regulating the services of telecomms networks in Kuwait.

Center for Information Technology Policy (CITP) - Princeton University

Center for Information Technology Policy (CITP) - Princeton University

The Center for Information Technology Policy at Princeton University is a nexus of expertise in technology, engineering, public policy, and the social sciences.

Lupovis

Lupovis

Lupovis is an AI-based deception solution that deploys active decoys turning your network from a flock of sheep to a pack of wolves where the hunter becomes the hunted.

Deloitte

Deloitte

Deloitte is a multinational professional services firm providing audit, consulting, financial advisory, risk management, tax, and related services to clients.

NormCyber

NormCyber

NormCyber provide award-winning cyber security and data protection as a service for midsize organisations.

Sababa Security

Sababa Security

Sababa Security is the first Italian innovation cyber security vendor, that provides security products, training, and managed services to protect diverse IT and OT environments.

Kaine Mathrick Tech (KMT)

Kaine Mathrick Tech (KMT)

KMT deliver comprehensive cyber-first outsourced technology support and solutions that scale with your business.

CrashPlan

CrashPlan

CrashPlan provides peace of mind through secure, scalable, and straightforward endpoint data backup.