FREE TO VIEW


« Back to News

2021-10-12

How To Use Transit Gateways To Monitor Traffic

Transit gateways are a way of managing traffic via different Virtual Private Clouds and AWS accounts, making them much easier to use. By Emily Henry

2021-10-12

Google’s DeepMind Faces Legal Action Over Data Misuse

DeepMind admits that it concentrated on building tools for clinicians, rather than thinking about protecting the privacy and other needs of patients.

2021-10-13

Don't Click On Pop-Ups

Dark Patterns are website design methods intended to collect more information and extract more cash than users intend by exploiting cookies.

2021-10-11

Britain's COVID - Driven Online Crime Wave

A recent survey reveals over 15 million (29%) of Britons feel unsafe online and 21% report they have been a victim of online identity theft.

2021-10-11

Massive Twitch Data Breach

Amazon's game-streaming platform Twitch, with 30m daily visitors, has been hacked, losing confidential company and user data.

2021-10-11

Career Opportunities: Top 10 Cyber Security Jobs & Salaries

Australia's fast growing cyber security industry offers prosperous careers to both graduates & experienced professionals at all levels.

2021-10-08

Using Artificial Intelligence To Fight Cancer

AI can help doctors make correct treatment decisions, reduce unnecessary surgeries and help oncologists improve cancer treatment plans.

2021-10-07

Leaked Facebook Documents Reveal Discriminatory Practices

Celebrities, politicians and high-profile Facebook users have different rules governing what content they can post, compared to 'ordinary' users.

2021-10-06

Ransomware Is The Number One Threat

Over one-third of organisations worldwide have experienced a ransomware attack targeting access to systems or data in the previous 12 months

2021-10-07

Inventive Ransomware Group Focused On Healthcare Data

With sensitive patient data and other vital information, healthcare services are often more likely to pay the ransom rather than risk exposure. 

2021-10-06

Facebook Weakens Democracy & Harms Children

A former Facebook product manager tells US lawmakers the tech giant's apps "harm children, stoke division and weaken our democracy".

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Versasec

Versasec

Versasec is a leader in identity and access management, providing customers with security solutions for managing digital identities.

Orange Cyberdefense

Orange Cyberdefense

Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group, providing managed security, managed threat detection & response services to organizations around the globe.

Ubisecure

Ubisecure

Ubisecure provide Identity & Access Management solutions.

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

Post-Quantum

Post-Quantum

Post-Quantum offer a unique, patented quantum-resistant encryption algorithm that can be applied to existing products and networks.

Surevine

Surevine

Surevine builds secure, scalable collaboration solutions for the most security conscious organisations, enabling collaboration on their most sensitive information.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

PhishX

PhishX

PhishX is a SaaS platform for security awareness that simulates Cyberthreats, train people, while measure and analysis results, reducing Cybersecurity risks for People and Companies.

DataEndure

DataEndure

DataEndure helps companies build digital resilience so that their critical information assets are protected and available to the right people, at the right time.

Corsica Technologies

Corsica Technologies

Corsica Technologies is recognized as one of the top managed IT and cybersecurity service providers. Our integrated IT and cybersecurity services protect companies and enable them to succeed.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.

SignMyCode

SignMyCode

SignMyCode is a one-stop shop for trusted and authentic code signing solutions to safeguard software.

ITButler e-Services

ITButler e-Services

At IT Butler, our mission is crystal clear: we are dedicated to providing top-tier cybersecurity solutions and best-practice methodologies to secure and enhance your digital infrastructure’s resilienc

Anthropic

Anthropic

Anthropic is a Public Benefit Corporation, whose purpose is the responsible development and maintenance of advanced AI for the long-term benefit of humanity.