News

2024-07-22

Student Who Sold Cyber Attack Software Is Jailed

DDoS For Sale: A student in Scotland gets a conviction for creating and distributing a mobile app he designed to disrupt corporate websites.

2024-07-19

Semiconductor Manufacturing Companies Stocks Fall

The soaring share prices of the makers of advanced semiconductors has crashed following statements from Donald Trump & the US government.

2024-07-19

Gaps Identified In Threat Intelligence Sharing & Collaboration

Effective information sharing is vital in the fight against cyber crime, but combining insights across teams & security platforms is hard work.

2024-07-22

New British Government Will Legislate On Cyber Security

Protecting Public Services from Cyber Attacks: The Cyber Security & Resilience Bill will expand existing regulation to ensure best practices.

2024-07-23

AI Is Predicted To Replace Eight Million British Jobs

Jobs Apocalypse: Women, young workers and low-paid individuals face the greatest threat from the AI-driven automation of many jobs.

2024-07-20

NATO’s New Cyber Defence Centre Is In Belgium

Integrated Cyber Defence: NATO's new centre will bring together civilian & military personnel from all allied countries, plus industry experts.

2024-07-20

MediSecure Hack - Half The Australian Population Affected

Around 13 million Australians have had their personal prescriptions and other healthcare data exposed in a hack that took place 3 months ago.

2024-07-18

Defending Against Business Email Compromise

Detection Strategies: Going beyond traditional measures to block malicious emails before they reach employees. By Mike Britton

2024-07-19

Large-Scale IT Outage Causing International Disruption

Supply Chain Incident: Services in multiple countries are affected. Airlines, government agencies, banks, telecoms & media outlets in chaos.

2024-07-18

Are Any Of Your Suppliers A Security Risk Waiting To Happen?

Organisations are only as strong as the weakest link in their supply chain. Avoiding risky 3rd-party vendors & suppliers is vital. By Manuel Sanchez

2024-07-17

Warnings Over Cyber Security At The Paris Olympics

Security experts warning of a tenfold increase in cyber attacks ahead of the summer Olympic Games, which commence on 26th July.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XBOSoft

XBOSoft

XBOSoft is a software QA and testing company. We cover the entire QA and testing life cycle including software and application security.

CyberSmart

CyberSmart

CyberSmart is a platform that allows you to maintain compliance, achieve certification and secure your organisation.

SafeCharge

SafeCharge

SafeCharge is a global provider of technology-based multi-channel payments services and risk management solutions for demanding businesses.

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

Caulis

Caulis

Caulis FraudAlert is a cyber security solution. It can detect fraud and identity theft based on users’ online behaviour.

Statice

Statice

Statice develops state-of-the-art data privacy technology that helps companies double-down on data-driven innovation while safeguarding the privacy of individuals.

ArmorText

ArmorText

ArmorText offers a seamless channel for communication and collaboration for organizations concerned with keeping communication data private and secure.

Quantum Security

Quantum Security

Quantum's game-changing approach to cybersecurity brings you performance and peace-of-mind, with a raft of additional benefits: it's non-proprietary, comprehensive, scalable, and affordable.

Stratum Security

Stratum Security

Stratum Security is an information security consulting company that focuses on providing clear and concise risk guidance to its clients through high quality assessment services.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

Global Resources

Global Resources

Global Resources' planning and management capabilities support city, regional, and national utility and infrastructure management, and information systems and cyber security service delivery.

CI-ISAC Australia

CI-ISAC Australia

CI-ISAC has been designed to support and promote existing legislation and Government initiatives that are working to uplift cyber resilience across critical infrastructure sectors.

Vault Cloud

Vault Cloud

Vault Cloud, Australia's National Cloud, is an Australian owned and operated company specialising in secure, sovereign, hyperscale cloud infrastructure.

Conifers

Conifers

Empower your existing SecOps team with the strength of AI - achieve SOC excellence with Conifers CognitiveSOC.

BestDefense

BestDefense

BestDefense offers proactive cybersecurity solutions that adapt in real-time to outpace evolving threats and ensure resilient protection for your critical assets.