News

2016-08-25

Cyber Insurance: A Digital Necessity

All businesses, large or small operate digitally in one form or another. They need to protect themselves against their cybersecurity risk.

2016-08-25

Too Much Information: Making Sense Of Big Data

The abundance of information online and across our devices can overwhelm even the most technically savvy individuals.

2016-08-25

What’s Your Personal Data Worth On The Dark Web?

Your personal information is going to be compromised at some point. How much is your ID, password or account number worth?

2016-08-25

Risky Business: Desktop Banking Declines As Users Switch To Apps

The use of internet banking on a computer has fallen for the first time as users switch to mobile apps.

2016-08-24

Made in Britain: Facebook's Drones

In a warehouse in Somerset UK, the latest phase in Facebook's bid for world domination has been taking shape.

2016-08-24

Donald Trump Doesn’t Understand Cyberwar

Donald Trump sat down with a few reporters from The New York Times for a rare, in-depth interview about his foreign policy ideas. Oh dear.

2016-08-24

For Sale: Leaked Terror Watch List

Stolen WorldCheck database containing a detailed list of suspected and convicted criminals & terrorists is reportedly being sold online $2,300.

2016-08-11

Top Tips To Protect Email Accounts From Hackers

Today email accounts have substituted one’s personal diary and could be described as an easy gateway to enter someone’s personal life.

2016-08-11

Tools & Training To ‘Hack Yourself’ To Security

How to teach your blue team to think like the red team when your network is under attack and time is your most valuable asset.

2016-08-11

DDoS Attacks Shuts Down Pro-ISIS Websites

Outraged hackers have combined forces to take down ISIS affiliated websites.

2016-08-11

Phineas Fisher Fingered: Hacking the Turkish Government

A notorious hacker has claimed responsibility for hacking Turkey’s ruling party, the AKP, stealing more than 300,000 internal emails and other files.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

Cryptosense

Cryptosense

Cryptosense provides the first application security software dedicated to the detection and remediation of crypto vulnerabilities.

ShiftLeft

ShiftLeft

ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Joint Accreditation System of Australia and New Zealand (JASANZ)

Joint Accreditation System of Australia and New Zealand (JASANZ)

JASANZ is the joint national accreditation body for Australia and New Zealand. The directory of members provides details of organisations offering certification services for ISO 27001.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

TrueFort

TrueFort

TrueFort take an application-first approach that offers comprehensive protection for real-time visibility and analysis, protection and better communication across business, IT, and security teams.

Isovalent

Isovalent

Isovalent deliver the most advanced Kubernetes networking & security capabilities to the most demanding of enterprise users.

01 Communique Laboratory

01 Communique Laboratory

01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security.

Start Left® Security

Start Left® Security

Great security culture doesn't just happen; you ENGINEER it.

Panther Labs

Panther Labs

Panther’s mission is to make security monitoring fast, flexible and scalable for all security teams.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

Apollo Secure

Apollo Secure

Apollo is an automated cybersecurity platform for startups and small businesses to achieve and maintain security compliance.

DART Consulting & Training

DART Consulting & Training

DART is a leading cyber training and consultancy company. We enhance our clients’ cyber capabilities by growing and strengthening their frontline defense – the cyber teams.

PureID

PureID

Protect your enterprise with PureAUTH #IAMFirewall, Resilient SSO platform, purpose built to provide Passwordless Authentication & Zero Trust Access, by default.

Hakai Security

Hakai Security

Hakai is a consulting firm specializing in information security that offers customized services and products to meet the needs and goals of each business.