News

2019-03-25

AI Will Not Replace Soldiers

Artificial Intelligence is poised to change the character of the future battlefield and the pace of threats faced in today’s security environment.

2019-03-19

National Security & Surveillance In The Age Of AI

GCHQ chief says the UK intelligence community needs to gain public trust regarding the use of Artificial Intelligence for national security purposes.

2019-03-18

NATO Agrees Collaboration On Cyber Security

NATO summit declares cyber threats to the security of the alliance are becoming 'more frequent, complex, destructive and coercive.'

2019-03-17

China Gives Police New Powers To Spy On Foreign Firms

Security experts have warned foreign firms operating in China that new laws may give the authorities more power to spy on and censor them.

2019-03-17

Protecting Personal Data

Cyber criminals don’t take a day off and neither should consumers when it comes to keeping your devices and your personal information safe.

2019-03-01

Sydney Airport Steps Up Cybersecurity

Sydney Airport is preparing to establish a cyber security operations centre to protect its systems and data holdings from the threat of cyber attack.

2019-03-01

US Under Attack By Chinese & Iranian Hackers

Geopolitics pay out in cyberspace as attacks from Iran and China reflect disagreements between nation states on sanctions and trade.

2019-03-13

Criminal Groups Offer Big Salaries For Cyber Skills

Criminal groups are promising $million dollar salaries to accomplices who can help them target high-worth individuals with extortion scams.

2019-03-13

Cyber-Spies For Hire

Governments across the world are gearing up for the next domain of warfare by recruiting the experienced soldiers of the future, cyber-spies.

2019-03-13

Top Six Cyber Secure Countries

Many governments are putting resources into enhancing their cyber security as the frequency of attacks rises. Six nations stand out.

2019-03-12

Only Four Suspects In Australia's High Level Attack

Suspicion is falling on China for targeting the computer systems of Australia's major political parties in a hack of 'unprecedented' sophistication.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Biscom

Biscom

Biscom offers solutions for secure file transfer, synchronization, file translation, and mobile devices, designed to deliver mission-critical reliability, streamline workflows and reduce costs.

Aptive Consulting

Aptive Consulting

Aptive is a cyber security consultancy providing Penetration Testing and Vulnerability Assessment services.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

Lepide

Lepide

LepideAuditor is a powerful Data Security Platform that enables you to reduce risk, prevent data breaches and prove regulatory compliance.

Onsist

Onsist

Onsist brand protection services provide proactive defense against fraudulent use of your brand online.

Security Alliance

Security Alliance

Security Alliance provide bespoke cyber intelligence consulting and research services.

Trava Security

Trava Security

Trava simplifies cyber risk management for business owners and IT professionals. Automated assessments, mitigation advising, and data-driven cyber insurance.

StrikeReady

StrikeReady

StrikeReady have developed CARA, an advanced technology solution that offers personalized and proactive assessment and remediation of future and current risk in real-time.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) protects Singapore from external threats and safeguards its interests in areas related to terrorism, cyber security, other transnational threats, and geopolitics

SessionGuardian

SessionGuardian

SessionGuardian (formerly SecureReview) is the world's first and only technology which ensures second-by-second biometric identity verification of your remote user, from log on to log off.

RegScale

RegScale

RegScale helps organizations comply in real-time with multiple compliance requirements (NIST, CMMC, ISO, SOX, etc), scalable to meet the needs of the entire enterprise.

Binarly

Binarly

Binarly has developed an AI-powered platform to protect devices against emerging firmware threats.

AHAD

AHAD

AHAD provides cybersecurity, digital transformation, and risk management services and solutions to Government, Fortune 500, And Start-Up Companies in the Middle East region.

Fairdinkum Consulting

Fairdinkum Consulting

Fairdinkum is a leading full-service IT consulting firm with more than two decades of experience in the industry.

Buzz Cybersecurity

Buzz Cybersecurity

Buzz Cybersecurity systems and services are designed to proactively guard against common and uncommon cyber threats.