FREE TO VIEW


« Back to News

2020-07-17

Security Risks of Contactless Payment

Consumers are driving the push towards contactless payment, but like any technology, it comes with mobile security and data privacy risks.

2020-07-15

Australia To Spend Another A$1billion On Cyber Security

Australia has announced a massive cyber security investment to combat a wave of 'unattributable' and damaging cyber-attacks. Whos' next?

2020-07-14

Attacks On Financial Services Are Increasingly Sophisticated

Sophisticated new attack vectors combined with poorly trained staff and malicious users hold a growing threat to the British financial system.

2020-07-13

US Companies Hit With A New Ransomware Campaign

The hacking group known as Evil Corp. has attacked major US companies using a dangerous new strain of ransomware called WastedLocker.

2020-07-10

Cyber Security Technology To Protect Autonomous Vehicles

Collaboration between smart car manufacturers and cyber security experts is essential to establish standards in this emerging technology.

2020-07-14

Fake News & Democracy In The Philippines

Legitimate news organisations are struggling to adapt to rapid technological change and tough economic circumstances in the Fake News era.

2020-07-10

Cyber Security Essentials For StartUps

While it may not seem the most urgent priority for entrepreneurs, increasing the emphasis on cyber security will reward a growing business.

2020-07-10

Fake News Promotes Extremism

The US Department of Homeland Security says social media fills the void for socially isolated individuals and amplifies violent extremism.

2020-07-09

Maritime Data For Sale On the Dark Web

Two separate ransomware attacks on a major shipping firm highlight the need for improved cyber security training in the maritime industry.

2020-07-06

Journalist’s Phone Hacked Using An ‘Invisible’ Technique

The iPhone was infected by “network injection,” a fully automated technique which intercepts a cellular signal when it visits a website.

2020-07-06

Iran’s Nuclear Site Attacked Following Attempts To Hack Israel's Water System

A cyber attack is thought to have caused a fire at Iran's Natanz nuclear enrichment facility, after a failed attempt to poison Israel's water supply.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Security Guru

IT Security Guru

IT Security Gurus publish daily breaking news. interviews with the key thinkers in IT security, videos and the top 10 stories as picked by our Editor.

Authenware

Authenware

AuthenWare delivers the highest level of identity security based on behavioral biometrics.

NSHC

NSHC

NSHC is a provider of mobile security solutions, cyber security consulting and training, and offensive research.

Cybercrime Investigation & Coordinating Center (CICC)

Cybercrime Investigation & Coordinating Center (CICC)

The Cybercrime Investigation and Coordinating Center (CICC) is an attached agency of the Philippines Department of Information and Communications Technology (DICT).

CyberProof

CyberProof

CyberProof aims to give clarity and confidence to businesses worldwide using a new risk-based approach to cyber security services.

Jerusalem Venture Partners (JVP)

Jerusalem Venture Partners (JVP)

JVP’s Center of Excellence in Be’er Sheva aims to identify, nurture and build the next wave of cyber security and big data companies to emerge out of Israel.

PurpleSynapz

PurpleSynapz

PurpleSynapz provides hyper-realistic Cyber Security Training with a modern curriculum and Cyber Range.

Onesecure Asia

Onesecure Asia

ONESECURE Asia’s expertise and services are built around its mission to provide reliable, robust and scalable technology solutions to cater for its customers’ needs.

UK Cyber Security Association (UKCSA)

UK Cyber Security Association (UKCSA)

The UK Cyber Security Association (UKCSA) is a membership organisation for individuals and organisations who actively work in the cyber security industry.

Start Left® Security

Start Left® Security

Great security culture doesn't just happen; you ENGINEER it.

Yogosha

Yogosha

Yogosha is a crowdsourced cybersecurity platform enabling a win-win collaboration with the most talented hackers to detect and fix vulnerabilities on your most critical systems.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

Omega Systems

Omega Systems

Omega Systems is a leading managed service provider (MSP) and managed security service provider (MSSP) to mid-market organizations.

Tracebit

Tracebit

Tracebit uses decoys to detect and respond to cloud intrusions in minutes.

BuddoBot

BuddoBot

BuddoBot has been a pioneering force in cybersecurity and information technology since 2008.