News

2018-08-10

Powering The Future Of Artificial Intelligence

AI’s rapid evolution is producing a very big expansion in various new types of hardware accelerators for machine learning.

2018-07-26

Healthcare Cyber-Attacks Still Going Up

Healthcare providers and government agencies across the US are scrambling to find adequate defense mechanisms against attackers.

2018-08-09

Public Cloud Security Is A Conundrum

According to the experts at Gartner, the cloud is just like traditional forms of computing, except that everything is different.

2018-08-07

Social Media Giants Under Caution In Vietnam

US lawmakers urge Google and others not to comply with a Vietnamese security law that requires local storage of domestic users’ data.

2018-08-06

Understanding Cyber Vulnerability, Threats & Risks

Less than half of security leaders are confident in their organisation’s ability to combat anything beyond simple cyber incidents.

2018-08-06

GDPR Survey Shows 80% Non-Compliance

Only 20% of companies surveyed believe they are GDPR compliant, while 53% are in the implementation phase and 27% have not started.

2018-08-02

Five Key Ways to Protect Your Company Against Cyber Attacks

The steps to achieving business security include the use of up-to-date data encryption, data back-up, firewalls, anti-malware software and insurance.

2018-07-25

Singapore’s Giant Healthcare Hack

Hackers attacked the computers of SingHealth, the Republic's largest public healthcare group and scooped up personal information on 1.5m patients.

2018-08-02

MoneyTaker Take Money From A Russian Bank

The MoneyTaker group are hard to track because they use common OS utilities to perform malicious actions, instead of relying on actual malware.

2018-07-25

Trump / Putin Summit Was A Magnet For Hackers

The Helsinki meeting between Presidents Trump and Putin was as big a magnet for hackers as the Singapore summit with Kim Jong-un.

2018-08-02

What A ‘Cyber 9/11’ Would Look Like

Experts think national cyber vulnerabilities stem in large part from a lack of qualified people capable of defending companies and governments.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Australian Information Security Association (AISA)

Australian Information Security Association (AISA)

AISA champions the development of a robust information security sector by building professional capacity and advancing the cyber security of the public, business and governments in Australia.

CloudPassage

CloudPassage

CloudPassage, a cloud security and compliance pioneer, safeguards cloud infrastructure for the world’s best-recognized brands.

6cure

6cure

The 6cure Threat Protection solution eliminates malicious traffic to critical services in real time and protects against DDoS attacks.

Eustema

Eustema

Eustema designs and manages ICT solutions for medium and large organizations.

CalCom

CalCom

CalCom Hardening Solution (CHS) for Microsoft OMS is a security baseline-hardening solution designed to address the needs of IT operations and security teams.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

XLAB

XLAB

XLAB is an R&D company with a strong research background in the fields of distributed systems, cloud computing, security and dependability of systems.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Collins Aerospace

Collins Aerospace

Collins Aerospace provides cybersecurity services and systems to protect critical infrastructure facilities and railroad operations.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

ISTC Foundation

ISTC Foundation

ISTC Foundation is one of the leading innovation centers in Armenia, founded by joint initiative of IBM, USAID, Armenian Government and Enterprise Incubator Foundation.

Ascent Solutions

Ascent Solutions

Ascent is built to help firms evolve their cybersecurity posture, modernize their Microsoft solutions, and accelerate their journey to the cloud.

Kriptos

Kriptos

Kriptos helps businesses improve their cybersecurity, risk, and compliance strategies by locating critical information through a technology that automatically classifies and labels documents using AI.

Klaatu IT Security (KITS)

Klaatu IT Security (KITS)

Klaatu IT Security is a boutique provider of cyber security services, empowering our clients to prioritise and reduce their cyber risk.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.

Fairdinkum Consulting

Fairdinkum Consulting

Fairdinkum is a leading full-service IT consulting firm with more than two decades of experience in the industry.