News

2019-10-04

The Future Of Cyber Security Is AI

A growing number of experts believe that Artificial intelligence will be at the forefront of the next wave of cybersecurity tools.

2019-10-04

Russian Government Hacking Groups Often Work Alone

Russia's state-sponsorerd hacker groups each use their own dedicated development teams, working with similar malware toolkits and frameworks.

2019-10-04

New US Cyber Attacks On Iran

Locked & Loaded: A repeat of a recent covert cyber-attack on Iran by US Cyber Command is growing more likely.

2019-10-03

Confidential Data On 24.3m Patients Found Exposed Online

Researchers found almost 600 medical archives freely accessible, containing 24.3 million data records from patients located in 52 countries.

2019-10-02

By 2021 The Cost Of Cybercrime Will Be $6 Trillion

The Internet is being used in similar ways that the oceans were employed for privateering, we are now seeing this in cyber crime and cyber warfare.

2019-10-02

Easy Cyber Knowldege Ch.4 The Internet of Things (IoT)

The IoT allows objects to connect and share data and this affects humans in many ways: Privacy, Security and Legal Standards are all at issue.

2019-10-02

Only 31% Of Employees Get Annual Cyber Security Training

Employee education is key for small businesses to prevent cyber attacks, yet many employees are not getting any regular cybersecurity training.

2019-10-01

Cyber Insurance Is Unsustainable On Its Current Path

One analyst thinks that the cyber insurance market is too narrow and over-concentrated at present. A new approach to understanding risk is required.

2019-10-01

The WannaCry Hangover

WannaCry detections are at an all-time high and it continues to infect computers worldwide, say the security experts at Sophos.

2019-10-01

Cyber Security Experts Needed in Australia

As organisations around the build their defences against cyber threats, the demand for cyber experts in Australia has dramatically increased.

2019-12-16

IT Governance - FREE Guide

IT Governance | Download the FREE guide: Information Security & ISO 27001 – An Introduction

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

Deltagon

Deltagon

Deltagon develops information security solutions to protect companies’ confidential information in e-communication and e-services.

Northwave

Northwave

Northwave offers an Intelligent combination of cyber security services to protect your information.

Cyberia Group

Cyberia Group

Cyberia is a leading Internet and Security services provider with operations in Saudi Arabia, Lebanon and Jordan.

PECB

PECB

PECB is a certification body for persons, management systems, and products on a wide range of international standards in a range of areas including Information Security and Risk Management.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Exponential-e

Exponential-e

Exponential-e provide Cloud and Unified Communications services and world-class Managed IT Services including Cybersecurity.

N-able

N-able

N-Able deliver simple and sophisticated monitoring, security, and business solutions that empower you to solve your toughest IT challenges.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

Nullify

Nullify

Nullify is your automated security sentry that continuously finds and fixes security issues across your codebase.

Mobb

Mobb

Mobb's AI-powered technology automates vulnerability remediations to significantly reduce security backlogs and free developers to focus on innovation.

Ipseity Security

Ipseity Security

Ipseity Security provide security-centric advisory and consulting services for organizations to secure their perimeter-less digital transformation to meet business and security requirements.

Gcore

Gcore

Gcore is an international leader in public cloud and edge computing, content delivery, hosting, and security solutions.

Collibra

Collibra

Collibra delivers a complete platform for data and AI governance, giving teams the visibility, control and confidence to turn data into a trusted asset.