News

2020-08-12

Australia's Cyber Security Plan Includes Domestic Surveillance

Australia plans to provide the ADS spy agency with new powers that will allow it to conduct domestic investigations for the first time.

2020-08-11

Which Industries Suffer Most From Remote Working?

Cybercrime threat rates by sector since lockdown vary significanty and some sectors have experienced a big increases in their threat levels.

2020-08-11

Six Reasons To Move Your SIEM To The Cloud

There are important differences between cloud and on-premises SIEM and moving to the cloud has several advantages. By Gilad David Maayan.

2020-08-11

Breaking Up Big Tech

America’s major tech platforms are using their market-share to entrench their dominance and insulate themselves from the threat of competition.

2020-08-10

Securing The Remote Workforce Is A Top Priority

The emergence of the worldwide coronavirus pandemic has pushed remote work to the top of the priority list for business. By Aaron Swain.

2020-08-10

Cyber Security Intelligence Directory - 5,000 Supplier Database

Our Directory now exceeds five thousand providers of cyber security products and services across specialist categories worldwide.

2020-08-10

Using Artificial Intelligence In Academic Research

The right AI powered tools and techniques can make a significant difference in how research is conducted and how fast results are obtained.

2020-08-10

Cyber Security Teams Worry Most About Phishing & Ransomware

Inundated with too many alerts, Cyber Security teams are struggling with a lack of visibility into threats, endpoint devices and access privileges.

2020-08-10

The Effects Of GDPR On EU / US Relations

The attempt by GDPR to extend EU privacy rights to every country receiving EU personal data suggests that privacy standards will be globalised.

2020-08-07

What Is A Cyber Security Audit?

A security audit is a critical component of modern business and its key purpose is to assist in developing a strategy for managing cyber security.

Directory of Suppliers

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

WEBINAR: How to achieve security visibility at scale in the AWS Cloud

WEBINAR: How to achieve security visibility at scale in the AWS Cloud

Thursday August 27, 2020: Join SANS and AWS Marketplace to learn how you can leverage solutions to create visibility at scale and allow you to do more with your data and improve your security posture.

Genua

Genua

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation.

Robert Half Technology

Robert Half Technology

Robert Half Technology offers a full spectrum of technology staffing solutions to meet contract and full-time IT recruitment needs.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

Red Canary

Red Canary

Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

Sabasai

Sabasai

Sabasai specialises in all aspects of insider threat management from training and education to building security frameworks and insider threat programs to on-site risk & vulnerability assessments.

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute is an independent non-governmental organization that focuses on research and analysis of security challenges including defence and cyber security.

SCUDOS

SCUDOS

The SCUDOS platform combines network access control with device inventory, risk assessment and incident response orchestration.