News

2023-09-26

Severe Risks From Remote Access Exposure

Response Time: Organisations are finding it difficult to manage their attack surfaces at a speed & scale necessary to combat threat actor automation.

2023-09-25

Is Your Business Ready To Embrace Artificial Intelligence? 

AI presents itself in a different way - it’s an entirely new area that requires continuous development and a new set of rules. By Andy Dunn

2023-09-25

Unmasking The Silent Threat Of Cryptojacking 

Zombie Devices: Unlike ransomware, cryptojackers want to remain in the system for as long and quietly as possible. By Spencer Starkey

2023-09-25

Zero-Trust: Protecting From Insider Threats

Unintended Consequences: Organisations need to constantly guard against insider threats - the cybersecurity risk that comes from within.

2023-09-22

Europol Identifies The Top Cyber Threats

Ransomware affiliate programs have become the main business model for ransomware groups, deploying multi-layered extortion techniques.

2023-09-22

Jargon Buster: Untangling The Complexity In Cybersecurity 

Device Security Affects Us All: Wouldn’t it be helpful to return to basics to explain & design security in a much easier way? By Chris Meidinger

2023-09-22

Exploring How Generative AI Is Contributing To Cybersecurity Threats & Risks

Generative AI is transforming businesses, while simultaneously posing significant risks and dangers in the hands of hackers. By Farwa Sajjad

2023-09-21

Australian Government Suffers A Widespread Ransom Attack

Prolific ransomware group ALPHV hacked a law firm providing services to numerous government agencies, facilitating a wave of secondary attacks.

2023-09-20

Chinese Hackers Have Been Reading US Government Emails

An advanced Chinese spying campaign that involved breaches of Government & Legislature emails went undetected for months.

2023-09-20

Enterprise Cybersecurity Today: A Vast Landscape To Secure

The trends towards remote working, online shopping & banking have multiplied the number of endpoints that need protection. By Richard Yew

2023-09-20

The Worst Places To Connect To Public Wi-Fi

If your employees use public Wi-Fi networks, there is a high chance of malware infection. How can you protect both your people and your business?

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Acunetix

Acunetix

Acunetix is a leading web vulnerability scanner, widely acclaimed to include the most advanced SQL injection and XSS black box scanning technology.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

Cybellum

Cybellum

Cybellum brings the entire product security workflow into one dedicated platform, allowing device manufacturers to keep the connected products they build cyber-secure and cyber-compliant.

Real Random

Real Random

Real Random is on a mission to enhance existing and new crypto-systems with its revolutionary solution to generating numbers that are Truly Random.

ReFoMa

ReFoMa

ReFoMa is a consultancy and advisory company with a focus on information Security.

Malleum

Malleum

MALLEUM are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

OCM Business Systems

OCM Business Systems

OCM are experts in the safe, secure and responsible disposal of IT & EPoS assets.

Conduent

Conduent

Conduent delivers mission-critical technology services and solutions on behalf of businesses and governments. Solution areas include digital risk and compliance.

ARCON

ARCON

ARCON offers a proprietary unified governance framework, which addresses risk across various technology platforms.

Servian

Servian

Servian is one of Australia's leading IT consultancies, with expertise in cloud, data, machine learning, DevOps and cybersecurity.

Naq Cyber

Naq Cyber

Naq is the number one platform for SMEs looking to become legally compliant and protect against cybercrime and other data-related incidents.

North Green Security

North Green Security

North Green Security is a UK-based cyber security training and consultancy company.

Windstream

Windstream

Windstream is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the US.

EmberOT

EmberOT

EmberOT is at the forefront of operational technology (OT) security, offering cutting-edge solutions designed to protect critical infrastructure within energy, utilities, and manufacturing sectors.

ViroSafe

ViroSafe

ViroSafe is a leading value-added distributor of IT security solutions in Norway.

Kloke

Kloke

Kloke specializes in data protection solutions, focusing on securing information over locations.