News

2021-10-12

How To Use Transit Gateways To Monitor Traffic

Transit gateways are a way of managing traffic via different Virtual Private Clouds and AWS accounts, making them much easier to use. By Emily Henry

2021-10-12

Google’s DeepMind Faces Legal Action Over Data Misuse

DeepMind admits that it concentrated on building tools for clinicians, rather than thinking about protecting the privacy and other needs of patients.

2021-10-13

Don't Click On Pop-Ups

Dark Patterns are website design methods intended to collect more information and extract more cash than users intend by exploiting cookies.

2021-10-11

Britain's COVID - Driven Online Crime Wave

A recent survey reveals over 15 million (29%) of Britons feel unsafe online and 21% report they have been a victim of online identity theft.

2021-10-11

Massive Twitch Data Breach

Amazon's game-streaming platform Twitch, with 30m daily visitors, has been hacked, losing confidential company and user data.

2021-10-11

Career Opportunities: Top 10 Cyber Security Jobs & Salaries

Australia's fast growing cyber security industry offers prosperous careers to both graduates & experienced professionals at all levels.

2021-10-08

Using Artificial Intelligence To Fight Cancer

AI can help doctors make correct treatment decisions, reduce unnecessary surgeries and help oncologists improve cancer treatment plans.

2021-10-07

Leaked Facebook Documents Reveal Discriminatory Practices

Celebrities, politicians and high-profile Facebook users have different rules governing what content they can post, compared to 'ordinary' users.

2021-10-06

Ransomware Is The Number One Threat

Over one-third of organisations worldwide have experienced a ransomware attack targeting access to systems or data in the previous 12 months

2021-10-07

Inventive Ransomware Group Focused On Healthcare Data

With sensitive patient data and other vital information, healthcare services are often more likely to pay the ransom rather than risk exposure. 

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium was created to encourage use-inspired research, training and technology awareness in cybersecurity.

Menlo Security

Menlo Security

Menlo Security Isolation Platform (MSIP) provides a new layer in the security stack that contains and eliminates all malware, every time.

Repository of Industrial Security Incidents (RISI)

Repository of Industrial Security Incidents (RISI)

RISI is a database of cyber security incidents that have (or could have) affected process control, industrial automation or SCADA systems.

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

SecuPi

SecuPi

SecuPi delivers data-centric security with data-flow discovery, real-time monitoring, behavior analytics, and protection across web and enterprise applications and big data environments.

CSIRT GOV

CSIRT GOV

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

Cytelligence

Cytelligence

Cytelligence is a cyber security consulting company with deep expertise in Cyber Breach Response, Cyber Breach Investigations, and Digital Forensics.

CNA Insurance

CNA Insurance

CNA offers a market-leading suite of cyber liability insurance products and risk control resources for businesses of all sizes.

Data Theorem

Data Theorem

Data Theorem is a leading provider in modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere.

UK Cyber Security Council (UKCSC)

UK Cyber Security Council (UKCSC)

The role of The UK Cyber Security Council is to champion the cybersecurity profession across the UK, provide representation for the industry, accelerate awareness and promote excellence.