BUSINESS > Services > Consulting


« Back to News

2025-01-17

Tackling Cyber Threats In The Public Sector

Phishing-Resistance Is Key: Public sector organisations need to have the necessary tools to protect against cyber threats. By Niall McConachie

2024-12-11

Ransomware Criminals Claim To Have Stolen Deloitte's Data

Brain Cipher: Spear phishing specialists say they have hacked the leading multinational professional services firm. Deloitte say otherwise.

2024-04-12

Helping CISOs Embrace Artificial Intelligence

Centre Of Excellence: Delivering AI-focused cybersecurity consulting services & products to help clients harness the power of AI in the organisation.

2023-07-17

SCADA Is Dead, Or Is It?

Advanced Manufacturing: The traditional automation pyramid has collapsed and the next generation of solutions has arrived. By Stefan Reuther

2023-07-07

Discovered - High Risk Vulnerabilities Affecting A Leading Building Management System

Common Vulnerabilities & Exposures: An unintended vulnerability, built into the operating system, might allow attackers remote access.

2022-10-19

The Dangers Of Inadequate Data Disposal

Delete: Failure to properly dispose of redundant IT equipment can lead to data breaches, violate data protection laws and risk financial fraud.

2021-08-16

Ransomware Attack On Accenture

If a global business consulting firm like Accenture can fall victim to a known ransom method like Lockbit, then hardly any business is secure.

2020-12-07

In The Age of Risk, Cyber Security Is The Leading Concern

A top insurance CEO says that Cyber Security is the most pressing exposure for business, more than the Coronavirus and climate change.

2020-09-01

Boards Should Insist On A Cyber Audit

Corporate boards are pivotal in improving the levels of company-wide cyber security and are responsible for managing cyber security resilience.

2020-01-27

How To Develop A Cyber Security Practice

The potential business opportunity from rising compliance requirements and security threats is hard to ignore. Here are some recommendations.

2019-11-25

'Cyber Ranges' Improve Corporate Security

Accenture has started offering clients practice Cyber Ranges in which companies can test how well they respond to simulated cyber attacks.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

GovCERT.HK

GovCERT.HK

GovCERT.HK is the Government Computer Emergency Response Team for Hong Kong.

Progress Flowmon

Progress Flowmon

Progress Flowmon (formerly Flowmon Networks) provide high performance network monitoring technology and behavior analytics to enhance network performance and deal with cyber threats.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) is the Directorate of MCIT responsible for the security of critical information infrastructures in Afghanistan.

Seconize

Seconize

Seconize empowers enterprises to proactively manage their cyber risks, prioritize remediations, optimize security spending and ensure compliance.

DeepView

DeepView

DeepView delivers a unified platform for managing risk on digital platforms. One interactive secure portal allowing employees to engage their networks securely and compliantly.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

TheGreenBow

TheGreenBow

TheGreenBow is a trusted VPN software company. We help organizations and individuals become cyber-responsible. For this, we design and develop reliable and easy-to-use solutions.

Banyax

Banyax

Banyax provides 24×7 real-time Cyber Defense Center Services using the latest technology tools to provide state-of-the-art defense.

Rhymetec

Rhymetec

Rhymetec are an industry leader in cloud security, providing innovative cybersecurity and data privacy services to the modern-day SaaS business.

Jera IT

Jera IT

Jera IT provide fully managed IT support, cybersecurity services, telecoms systems, and IT strategy consultancy to businesses based in Aberdeen and the surrounding area.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

US Cyber Games

US Cyber Games

US Cyber Games is committed to inform and inspire the broader community on ways to develop tomorrow’s cybersecurity workforce.

Sattrix Information Security

Sattrix Information Security

Sattrix Information Security understand the evolving threat landscape and provide businesses with comprehensive cybersecurity solutions.

Cyber Castellum

Cyber Castellum

Cyber Castellum is a cybersecurity consulting firm that specializes in the identification of security vulnerabilities in an organization’s technology landscape.

BeamSec

BeamSec

BeamSec is a cybersecurity solutions provider committed to addressing the human element of risk against the evolving landscape of email-based cyber threats.