News

2023-10-09

Police Access To Passport Database 'risks public trust'

Plans to integrate the UK Police National Database and Passport Office data will enable police to find a facial match with the 'click of one button'.

2023-10-07

China Is A No Fly Zone For The Australian Prime Minister

Anthony Albanese’s trip to Beijing has been cancelled following security advice because his RAAF jet could be hacked by Chinese spies.

2023-10-09

Garbage In / Garbage Out: Training AI Algorithms

One of the risks posed by AI technology is the significant security threat to the vast data needed to train their algorithms & improve performance.

2023-10-09

Cyber Incidents At British Firms Up 25%

Less than half of British companies are confident in their ability to handle the biggest threats facing organisations, including phishing & malware.

2023-10-06

Safeguarding Businesses From Security Challenges In Advertising

Navigating The Pitfalls Of Google’s AI Data Privacy: Giving up control over ad placement is convenient, but carries several risks. By Mathew Ratty

2023-10-06

The Role of Circuit Breakers In Cybersecurity

The Importance Of Electrical Power: Circuit breakers can prove to be an invaluable asset as they help keep the cybersecurity infrastructure intact.

2023-10-05

Indian Police Crackdown On Social Media Financial Fraud

Victims were defrauded with the promise of huge returns on small investments, contacting them via the WhatsApp & Telegram instant messaging apps.

2023-10-06

Top Five Cloud Penetration Testing Tools

Cloud penetration testing is focused exclusively on cloud infrastructure. What are the current best tools & methodology? By Vidushi Dubey

2023-10-08

Industrial Control Systems Company Held To Ransom

Update: An international supplier of building technology & control systems has been attacked by the 'Dark Angels' ransomware gang.

2023-10-04

The Impact Of Artificial Intelligence On Cybersecurity

Balancing Promise With Reality: The belief that Artificial Intelligence alone can guarantee cybersecurity is overhyped.. By Helen Kruger

2023-10-03

Mapping Out The Journey To Zero Trust

Zero Trust has emerged as the gold standard cybersecurity methodology, but adopting it is a long term, evolutionary process. By John Linford

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Foregenix

Foregenix

Foregenix are global specialists in Digital Forensics and information security including Penetration testing and Website Security.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

United Nations Office on Drugs & Crime (UNODC)

United Nations Office on Drugs & Crime (UNODC)

UNODC promotes long-term and sustainable capacity building in the fight against cybercrime through supporting national structures and action.

Cyberarch Consulting

Cyberarch Consulting

Cyberarch is a security-focused consulting firm. We provide services specializing in information security, digital forensics, penetration testing and cyber security training.

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic's main goal is toward establishing an international reference centre for excellence in the field of digital forensics and data recovery services.

IP2Location

IP2Location

IP2Location provide services to identify geolocation by IP address, and to detect IP addresses associated with anonymous proxy servers, which are often used for fraud and spamming purposes.

Edureka

Edureka

Edureka is an online technology training provider with the most effective learning system in the world. We help professionals learn trending technologies for career growth.

Allied Telesis

Allied Telesis

Allied Telesis delivers the secure, flexible, and agile solutions needed to meet the expectations of any industry’s critical mission.

Netgo

Netgo

Netgo group meet the requirements of a complex, digitized world with IT consulting, IT solutions & services, managed & cloud services and software products & development.

Pathlock

Pathlock

Pathlock (formerly Greenlight) help enterprises and organizations automate the enforcement of any process, access, or IT general control, for any business application.

SEK Security Ecosystem Knowledge

SEK Security Ecosystem Knowledge

SEK helps companies in the complex path of cybersecurity; in the analysis, detection and prevention of digital threats.

OneStep Group

OneStep Group

OneStep Group are a leading Australian provider of information and communications technology (ICT) services, connecting businesses through technology solutions and support.

FutureRange

FutureRange

Specialising in IT Managed Services, Cybersecurity and Digital Transformation, FutureRange experts provide professional IT services for clients throughout Ireland and beyond.

Atlas Systems

Atlas Systems

Atlas Systems helps companies large and small accelerate their digital transformation journeys – expanding their capabilities and delivering tailored solutions including cybersecurity.