News

2022-12-28

Cyber Security Awareness Training For Management & Employees [extract]

What You Can Do Right Now: Businesses are facing unprecedented economic pressures - a cyber attack is the last thing any organization wants.

2024-07-15

A Brief History Of Cyber Crime [extract]

With advances in technology inevitably come heightened risks with cybercrime, which has exploded to become the most active form of crime globally.

2024-08-06

Building Resilience In A Changing Cyber Threat Landscape

Minimising Attacks: Businesses need to arm themselves with AI-enabled defences that are stronger than AI-enabled threats. By Duncan Bradley

2024-08-04

Millions Of US Voters Exposed Online

The exposed databases contained documents with lists of 4.6m available or active voters, absentees, early mail-in voting records & duplicate voters. 

2024-08-05

The Paris Olympics: More Than Just Gold Medals Are At Stake

Liberty, Equality, Security: The Games are a major target for cyber criminals, who see an opportunity to cause major disruption. By Steve Bradford

2024-08-05

Russian Cyberwar Methods Are Evolving

Russia's changing priorities may be an indication that cyber weapons are becoming a more effective alternative to their conventional weapons.

2024-08-05

Cyber Crime Hothouses In Myanmar

Slave Labour: Online fraud in Southeast Asia is continuing to grow, with organised crime syndicates generating an estimated $64 billion annually.

2024-08-05

App Security Testing: Exploring The Pros & Cons Of Different Approaches 

Understanding Emerging Technology Risks: It is important to be familiar with the different approaches in app security to choose the right solutions.

2024-08-02

Dark Angels Score Record Breaking $75m Ransom

Extortion Pays: ThreatLabz has uncovered a victim who paid Dark Angels $75 million in ransom, higher than any previous publicly known amount.

2024-08-02

Hackers Target Maritime Facilities With Malware

Sidewinder: An Indian APT using spear-phishing to deliver malicious payloads to conduct espionage and trigger new chains of attack.

2024-08-01

AI At The Paris 2024 Olympics

The 2024 Games are using AI tools across many applications. But the large amounts of data being generated risk being used for malicious purposes.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

Research Institute in Trustworthy Industrial Control Systems (RITICS)

Research Institute in Trustworthy Industrial Control Systems (RITICS)

RITICS is one of three Research Institutes formed as part of the UK National Cyber Security Strategy.

Identity Automation

Identity Automation

Identity Automation is a leading provider of Identity and Access Management software.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

ColorTokens

ColorTokens

ColorTokens Xtended ZeroTrust Platform protects from the inside out with unified visibility, micro-segmentation, zero-trust network access, cloud workload and endpoint protection.

Griffeshield

Griffeshield

Griffeshield is a company specialised in new information technologies used to protect Intellectual Property.

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

Cyphra

Cyphra

Cyphra’s team provide cyber security consulting, technical and managed services expertise and experience to support your organisation.

Viria

Viria

Viria is an information and security technology solution provider that promotes digitalization in a secure way.

Raman Power Technologies

Raman Power Technologies

Raman Power Technologies focus on bringing value and solving business challenges through the delivery of modern IT services and solutions including cybersecurity.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

Baidam Solutions

Baidam Solutions

Baidam Solutions is a 100% Australian owned and operated First Nations information technology business.

SpectrumWise

SpectrumWise

SpectrumWise is a business technology specialist that provides Managed Services and Managed Security for small and medium IT Networks.