News

2016-12-13

Five Biggest Data Breaches In History (That We Know About)

Data Loss is up 30% in the first 6 months of 2016 and Identity Theft is now the favourite tactic for hackers and cyber criminals. Here are 5 big ones.

2016-12-12

Snowden Worried That He'll Face Prison Or Execution If Russia Sends Him Home.

From safety in Moscow, Snowden says he has no regrets about blowing the whistle on the NSA but admits he's worried about being handed over to the US.

2016-12-09

Facebook, Microsoft, Twitter & YouTube: Collaborating To Remove Terrorist Content

Social media heavyweights announce they will cooperate on a plan to help limit the spread of terrorist content online.

2016-12-08

Rise Of The Machines

The Institute for Critical Infrastructure Technology (ICIT) say the Mirai Botnet attack on Dyn was just a rehearsal for an even bigger event.

2016-12-08

Next 3 Years Most Critical Of All For Technology

About 40% of CEOs think they will be running a completely different entity in the next three years.

2016-12-08

Banks Plan To Hoard Bitcoins

Big banks planning to stockpile bitcoins in order to pay off cyber criminals who threaten to bring down their critical IT systems.

2016-12-07

Just How Safe Is Online Banking?

Banking online is convenient, but how can you you protect against your accounts being emptied by fraudsters? Here is some useful advice.

2016-12-07

Yes, Russia Weaponised Social Media In The US Elections

Russia didn't just hack & leak documents from US political groups, it used social media as a weapon to influence perceptions about the election.

2016-12-07

Half The World's Population Is Not Yet On The Internet.

Room For Growth: More than half of the world's population still isn't using the Internet.

2016-12-07

What Are The Big Cyber Threats In 2017?

It looks like 2016 will be remembered as the year of the data breach and several obvious threats are likely to feature next year.

2016-12-06

AI Beating Humans? Not In My lifetime, Says Google Chief

The head of Google's cloud business says she doesn't expect machine intelligence to exceed that of humans during her lifetime.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

Tenfold Software

Tenfold Software

Tenfold is the unique, centralized platform for managing user and permissions efficiently and automatically.

KOVRR

KOVRR

Kovrr financially quantifies cyber risk on demand. Our technology enables decision makers to seamlessly drive actionable cyber risk management decisions.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

Taoglas

Taoglas

Taoglas Next Gen IoT Edge software provides a pay as you go platform for customers to connect, manage and maintain their edge devices in an efficient and secure way.

Rizikon Assurance

Rizikon Assurance

Rizikon Assurance is an Online System that improves Third-Party Assurance and Risk Management, through efficiency, automation and better visibility.

Conatix

Conatix

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity.

Redwall Technologies

Redwall Technologies

Redwall provides cybersecurity expertise and technology to prevent and respond to emerging threats against mobile applications and connected infrastructures.

eSec Forte Technologies

eSec Forte Technologies

eSec Forte Technologies is a CMMI Level-3 ISO 9001-2008, 27001-2013 certified global consulting and implementation company focused on Information Security and Cyber Security.

SkyePoint Decisions

SkyePoint Decisions

SkyePoint Decisions is a leading Cybersecurity Architecture and Engineering, Critical Infrastructure and Operations, and Applications Development and Maintenance IT service provider.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

Randaemon

Randaemon

RANDAEMON’s mission is to create True Random Number Generators (TRNG) that are hardware-based and integrated into System-on-Chip.

PROVINTELL Cyber Security

PROVINTELL Cyber Security

PROVINTELL is a Managed Security Service Provider (MSSP) specialising in Next-Gen Cyber Defense and Response to detect and respond to threats.

FTI Consulting

FTI Consulting

FTI Consulting is a global business advisory firm dedicated to helping organizations manage change, mitigate risk and resolve disputes.

BCX

BCX

BCX, a subsidiary within Telkom Group, is one of Africa’s largest systems integrator and digital transformation partners for enterprises and public sector organisations.