FREE TO VIEW


« Back to News

2021-12-22

Microsoft's New AI Debugging Tool

BugLab: Microsoft’s concept is to develop an AI that can automatically find and repair software bugs using a 'hide and seek' game as the model.

2021-12-21

The Pentagon Needs To Change How It Does AI

The US Defense establishment needs a more integrated approach to AI if it is to translate its technical capabilities into effective military tools.

2021-12-21

Stealthy Malware Hiding Behind An Invalid Date

e-Commerce At Risk: A highly sophisticated malware targeting online stores, CronRAT is undetected by many antivirus engines.

2021-12-20

Protecting Your E-Commerce Business Against Ransomware Attacks

Online sales are soaring and businesses are building their digital presence, but they must ensure their cyber security keeps pace. By Neville Louzado

2021-12-20

Education Should Focus On Cyber Security

The rapid adoption of technology & new industrial partners leaves education providers more exposed to cyber security threats ever before.

2021-12-31

Security Trends For 2022 - The Need For Talent & Cloud Migration

2021 was a turbulent year in cyber security and two significant trends for 2022 are the need for talent and a move to the cloud. By Mark Guntrip

2021-12-17

Are Remote Contractors A Cyber Security Risk?

It is vital for businesses to integrate remote contractors and ensure they understand how to keep their employer secure. By Chester Avey

2021-12-16

Toolbox For Outlook Password Is Unrivaled

Losing data without backups can be a real disaster. Fortunately, there are powerful tools you can use to save contacts, messages & attachments.

2021-12-16

Hackers Compromise Indian Prime Minister's Twitter Account

Cryto Currency Deception: Narendra Modi's 73million followers were sent false messages about India's intentions to adopt Bitcoin as official currency.

2021-12-15

Stolen: Personal Details Of 80k Australian Government Employees

Over 80,000 South Australian government workers had their private data stolen in a ransomware attack & their employer is getting the blame.

2021-12-14

Keeping Women Safe On British Streets

WalkSafe: Women feel less safe when walking alone after dark and now there is a real time SatNav tracking App available to give reassurance.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

EnigmaSoft

EnigmaSoft

EnigmaSoft is known for its PC anti-malware remediation utility and service under the tradename SpyHunter.

HighPoint

HighPoint

HighPoint is a leading technology infrastructure solutions provider offering consultancy, solutions and managed services for network infrastructure and cybersecurity.

UTMStack

UTMStack

UTMStack is a Unified Security Management system that includes SIEM, Vulnerability Management, Network and Host IDS/IPS, Asset Discovery, Endpoint Protection and Incident Response.

Epoch Concepts

Epoch Concepts

Offering a full line of IT services, solutions, and integration capabilities, Epoch Concepts is the trusted partner of the US military, federal agencies, private enterprises, and systems integrators.

RapidSpike

RapidSpike

RapidSpike is the only website monitoring solution that focuses all three key aspects of website health: performance, reliability AND security.

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center (ACC)

Azerbaijan Cybersecurity Center is a state-of-the-art facility to deliver advanced cyber training programs and build the next generation of Azerbaijan’s cybersecurity professionals.

Sri Lanka CERT

Sri Lanka CERT

Sri Lanka CERT is the National Centre for Cyber Security, which has the national responsibility of protecting the nation’s cyberspace from cyber threats.

Assetnote

Assetnote

The Assetnote platform enables organizations to effectively map and continuously monitor their external attack surface.

Bearer

Bearer

Bearer helps modern teams ship trustworthy products with the help of our code security solution built for security, privacy and engineering teams.

Cyberlocke

Cyberlocke

Cyberlocke is dedicated to finding inventive solutions to meet the distinct IT obstacles of each organization we support.