News

2020-05-15

Coronavirus Phishing Scams

Cybercriminals are taking full advantage of the pandemic and phishing is a current favorite tool of coronavirus scammers. By Caleb Danziger

2020-05-15

CISO's Cant Find The Right People

Top security executives agree that the internal skills gap remains the biggest single barrier to getting their business strategy in place.

2020-05-15

Beware The Latest Malware

Malware attacks are more damaging than ever before. How can you protect your business against the latest threats? By Chester Avey

2020-05-13

Cyber Security Market Slowdown Blamed On Coronavirus

The global cyber security market is forecast to grow at a slower average rate of 6.2% per year to 2023, due to the coronavirus pandemic in 2020.

2020-05-13

Iran Fingered For Attack On Israeli Water Infrastructure

Iranian hackers are reported to have used servers located in the US to deliver an attack on Israel's water and sewage infrastructure.

2020-05-13

Darktrace Moves Towards A Massive IPO

The British cyber security leader Darktrace is working towards an IPO next year after growing its market capitalisation to more than $2 billion.

2020-05-13

Solutions For Smarter Cities

City infrastructure is growing much more complex, driving a need for a comprehensive & integrated approach for operations and management.

2020-05-12

Quantum Science Will Revolutionise Security

Quantum computing is predicted to transform scientific research, stock market prediction and cryptography, a key component of cybersecurity.

2020-05-12

Careers In Artificial Intelligence

AI is a job. With the growing adoption of AI technology across many industries there is a growing need for trained professionals.

2020-05-12

Fake Messaging Affects Australian Virus Tracing App

Users of the newly released Australian Health Service tracing app COVIDSafe are being randomly affected by mystery fake messaging.

2020-05-11

New Dark Web Search Engine Can Strengthen Business Security

Beacon: Organisations interested in tracking their intellectual property & corporate secrets turning up on the Dark Web can use a new search tool.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

AON

AON

Aon is a leading global provider of risk management (including cyber), insurance and reinsurance brokerage, human resources solutions and outsourcing services.

Bastille

Bastille

Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, cellular, IoT) in your organization.

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

National Intelligence Service (NIS) - South Korea

National Intelligence Service (NIS) - South Korea

The NIS oversees policy on cyber security in South Korea by formulating and coordinating the execution of such policy and devising necessary schemes and guidelines.

Recorded Future

Recorded Future

Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

iQuila

iQuila

iQuila is a virtual overlay network which runs on top of an existing network. It creates a secure software enabled layer 2 connection across the internet or any public or private cloud.

e-End

e-End

e-End provides hard drive shredding, degaussing and data destruction solutions validated by the highest electronic certifcations to keep you compliant with GLB, SOX, FACTA, FISMA, HIPAA, COPPA, ITAR.

Global EPIC

Global EPIC

Global EPIC is an international cybersecurity initiative designed to combat growing world challenges by facilitating global collaboration in the field of cyber security.

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

South West Cyber Resilience Centre (SWCRC)

South West Cyber Resilience Centre (SWCRC)

The South West Cyber Resilience Centre (SWCRC) is led by serving police officers, as part of a not-for-profit partnership with business and academia.

TrustCloud

TrustCloud

TrustCloud is a global company specializing in the orchestration and custody of secure digital transactions including identification, signature, payments, and electronic custody.

Sacumen

Sacumen

Sacumen is a niche player in the cybersecurity market, solving critical problems for security product companies.

Infodot Technologies

Infodot Technologies

Infodot Technologies specialize in a co-managed IT support and services approach, where businesses share their IT responsibilities with a skilled Managed IT Services Provider (MSP).