News

2015-09-23

Xerox Memory Labels Fight Counterfeiting

A printed "memory label" from Xerox that stores 36 bits of data that can be encrypted and used for authentication & tracking

2015-09-23

Google's Self-driving Car Push Spurs Hiring Spree

Premium car makers are snapping up software experts as Google threaten to beat them in the race to a self-driving car.

2015-09-23

Hackers Can Spy on Every Mobile

There is a security hole in modern telecommunication systems that allows cyber criminals to listen in & to read text messages.

2015-09-22

India and US Cyber Agree Security Pact to Combat Crime

Facing a common threat from overseas cyber-attacks, India and the US recently decided to join hands in combating cyber crime.

2015-09-24

The Pentagon Goes Shopping For A New Mobile Phone

The Pentagon is trying to adopt private sector cyber technology with a new top-secret mobile, guest WiFi and Silicon Valley Interns.

2015-09-22

FBI Urges Firms to Plan For Cyber Attack

An FBI security expert calls on businesses of all sizes to make a cyber incident response plan to combat the big increase in global security threats.

2015-09-24

Why Cybercrime Now Exceeds Conventional Crime

Online crime worldwide is increasingly displacing conventional forms of property crime and often goes unreported and uninvestigated.

2015-09-25

Using Threat Intelligence Against Cybercriminals

Companies and governments do not traditionally share data about successful attacks. Threat Intelligence can fix that.

2015-09-22

The Shocking State of Cybercrime in Russia

Stolen credit cards, fraud, banking information theft & malware infections. Stealing from cryptocurrency wallets ... we could go on.

2015-09-22

Why Aren’t Companies Using Military Security?

Why do defense companies have classified networks to prevent cyber attack, while companies handling our critical utilities don’t?

2015-09-22

Vodafone Leaked Email on 'hacking' of Reporter

Vodafone Australia under pressure over the potentially unlawful access of private phone records to track down a journalist’s source.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

BruCERT

BruCERT

BruCERT is the referral agency for dealing with computer-related and internet-related security incidents in Brunei Darussalam.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

Joe Security

Joe Security

Joe Security specializes in the development of automated malware analysis systems for malware detection and forensics.

LEXFO

LEXFO

LEXFO specializes in the security of information systems, assisting clients in protecting information assets using an offensive and innovative approach.

Military Cyber Professionals Association (MCPA)

Military Cyber Professionals Association (MCPA)

MCPA are a team of Soldiers, Sailors, Airmen, Marines, Veterans and others interested in the development of the American military cyber profession.

vdiscovery

vdiscovery

vdiscovery is a provider of proprietary and best-in-breed solutions in computer forensics, document review, and electronic discovery.

Living Security

Living Security

Living Security specializes in metric driven and engaging security awareness solutions that reduce risk by increasing security culture and changing employee behaviour.

Eseye

Eseye

Eseye is a global specialist supplier of cellular internet connectivity for intelligent IoT (Internet of Things) devices.

Anglo African

Anglo African

Anglo African is an information technology firm providing end-to-end solutions to different industries, from IT Infrastructure to DataCom as well as Cloud & InfoSec services.

Dracoon

Dracoon

DRACOON is market leader in the German-speaking region for secure enterprise file sharing.

White Hawk Software

White Hawk Software

White Hawk provides code tamper-proofing solutions to protect mission critical software applications from malicious and Zero day attacks and reverse engineering at run time.

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

Theta432

Theta432

THETA432 is a cybersecurity firm that provides 24/7/365 managed prevention, detection, response, Hybrid SOC, cyber defense monitoring services with dynamically defined defense (3D™).

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

Zafran

Zafran

Zafran is a Risk & Mitigation Platform that defuses threat exploitation by mobilizing existing security tools.