News

2019-11-29

Internet of Things: Cyber Security Threats In 2020

IoT devices can work seamlessly at home, industry and in business. The problem is they also allow hackers easy ways into computer systems.

2019-11-29

Australian Parliament Hacked

It took a week to eject the state-sponsored attacker from the Australian Parliament’s IT system. They don't say the extent of the damage.

2019-11-27

Tracking 5G Protocol Flaws

Researchers have identified various security flaws in the 5G communications protocol. These include user tracking, eavesdropping and spurious billing.

2019-11-27

Cloud Storage: What Is It & Who Runs It?

Cloud computing involves outsourcing tasks you can do using your own equipment to a few large corporations. To assume it is secure is a mistake.

2019-11-29

WEBINAR: How to Leverage a CASB for Your AWS Environment

Thursday 12 December: Join SANS and AWS Marketplace to discover how to integrate modern technologies and secure your AWS footprint.

2019-11-26

GDPR Data Regulations & Commercial Fines

GDPR allows EU citizens to see what data is held on them by an organisation and how it is being used. But not all infringements lead to fines.

2019-11-26

Parliament Wants A New Cyber Security Director

Career Opportunities: To maintain awareness of internal & external threats and to be cybersecurity advocate to members of the UK Parliament.

2019-11-26

More Women Should Engage In Cyber Security Jobs

History is filled with women leaders in Science and Technology, which is why it’s puzzling that only 20% of the cyber security industry is female.

2019-11-25

Louisiana Hit With A Ransom Attack

The nations of Crimea, Georgia and Ukraine. The cities of Atlanta and Johannesberg. Now, the state government of Louisiana is knocked offline.

2019-11-25

Regulatory Plans For Artificial Intelligence & Algorithms

Two pieces of legislation are under consideration by the US Congress, one regulating the use of Algorithms and the other the development of AI.

2019-11-25

N Korean Hackers Are Targeting India

N Korean hackers identified with with wide-ranging financial theft are now being linked to attacks on India's nuclear power and space programs.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Hack in the Box Security Conference (HitBSecConf)

Hack in the Box Security Conference (HitBSecConf)

HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events feature two days of training and a two-day multi-track conference

LogonBox Software

LogonBox Software

LogonBox Software specialises in producing a cost-effective range of Network Security and Identity Management software solutions for all sizes of Enterprise.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

Segusoft

Segusoft

With its encryption platform SEGULINK, Segusoft provides standard software for companies to securely transfer files and messages.

National Cybersecurity Hub - South Africa

National Cybersecurity Hub - South Africa

The mission of the National Cybersecurity Hub is to be the central point of collaboration for cybersecurity incidents in South Africa.

Logic Supply

Logic Supply

Logic Supply is a global industrial PC company focused on hardware for the IoT edge. We design highly-configurable computers engineered for reliability.

FraudScope

FraudScope

FraudScope is an AI-assisted platform that accelerates the identification of fraud, waste, and abuse.

Enclave Networks

Enclave Networks

Our mission is to give IT professionals a simple way to rapidly build secure connectivity between any application, computer system, device or infrastructure - regardless of the underlying network.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

CyNam

CyNam

CyNam is a platform for enabling the growth and development of people and organisations within Cheltenham’s flourishing cyber technology ecosystem.

Global Cybersecurity Association (GCA)

Global Cybersecurity Association (GCA)

GCA’s Symposium and conferences featuring global thought leaders and CISOs provide a global best practice perspective on cybersecurity.

CSIR Information & Cybersecurity Research Centre

CSIR Information & Cybersecurity Research Centre

The CSIR Information & Cybersecurity Research Centre focuses on research, development, and innovation of home-grown cyber and information security.

Ping Identity

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom.

Space Hellas

Space Hellas

Space Hellas is a dynamic, established System Integrator and Value Added Solutions Provider, holding a leading position in the high technology arena.

Cambridge International Systems

Cambridge International Systems

For more than 25 years, Cambridge has been fighting bad actors in both the cyber and physical worlds.

Mogwai Labs

Mogwai Labs

Mogwai Labs deliver cutting-edge penetration tests, security assessments and trainings, to safeguard your applications, networks and cloud environments from cyber threats.