BUSINESS > Services > IT & Telecoms


« Back to News

2025-02-03

US Nationals Indicted For Fraudulent Remote IT Work

The FBI has uncovered a plot to install North Korean IT workers as remote employees to generate revenue for North Korea and evade sanctions.

2025-01-20

Data Broker Discloses A Major Breach Of App User Data

Misappropriated Access Key: Hacked data appears to have originated in thousands of smartphone apps, including Tinder, Grindr and Candy Crush.

2025-01-18

Thermodynamic Computing - A New Computer Architecture

A Third Way: Thermodynamic Computing aims to make use of the inherent noise and fluctuations of matter to power advanced computations. 

2025-01-15

Understanding The Importance of Kernel-Level Security

Is Your ICS Kernel Vulnerable?: The kernel is at the core of any industrial operating system - protecting its security is essential. By Tim Reilly

2025-01-11

CISA Finds Serious Problems In Oracle & Mitel Systems

Known Exploited Vulnerabilities: Thousands of network servers found to be exposed to unauthorised admin access and data extraction.

2025-01-06

Apple Will Pay $95m Penalty For Misusing Siri

Apple will have pay $95m to settle a case which claimed that its Siri virtual assistant was listening in to Apple users without their permission.

2025-01-03

Hackers Deploy Malicious Chrome Extensions

Supply Chain Attack: A large-scale hacking campaign targeting Chrome extensions has affected customers of a leading cyber security firm.

2024-12-27

IoT Devices Infected With Pre-Installed Malware

BadBox: Android malware embedded in the device’s firmware, which enables interception of private credentials & can install other malicious software.

2024-12-23

A Guide to Understanding Market-Leading Data Storage Solutions

Data storage can be a matter of business survival. Cyber resilience, quick recovery & a robust storage strategy are vital. By Billy Conway

2024-12-17

The Challenges Of Middle Management In Email Cybersecurity

Implications & Emerging Trends For 2025: Middle managers must be encouraged to take leadership accountability for cybersecurity. By Richard Bourne

2024-12-30

Fiber Optic Switches: Powering Secure, High-Speed Networks

Fiber optic switches back up security through precise traffic segmentation, enabling controlled access to sensitive network segments.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

WIRED

WIRED

WIRED is the magazine about what's next – the people, the trends and the big ideas that will change our lives. Topics covered include cyber security.

Evok

Evok

EVOK is an IT Service provider specialized in installing, maintaining and supporting IT infrastructures for SMB's in Switzerland.

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

Tukan IT

Tukan IT

Tukan IT provides a data classification and protection solution.

Cyber Security Expo

Cyber Security Expo

Cyber Security EXPO is a unique one day recruitment event for the cyber security industry.

Datplan

Datplan

Datplan offers a software solution that gives an overview of 8 key cyber risk areas, their threats, and risk management steps.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

Port53 Technologies

Port53 Technologies

Port53 Technologies is focused on delivering enterprise-grade, cloud-delivered security solutions that are easy to deploy, simple to manage and extremely effective.

BLUECYFORCE

BLUECYFORCE

BLUECYFORCE is the leading professional training and cyber defense training organization in France.

ISARR

ISARR

The ISARR software platform - your bespoke Risk, Resilience & Security Management solution. Simple, cost effective and adaptable, now and into the future.

ControlMap

ControlMap

ControlMap is a software as a service platform with a mission to simplify and eliminate stress from everyday operations of modern IT compliance teams.

IronClad Encryption (ICE)

IronClad Encryption (ICE)

Ironclad Encryption is Dynamic Encryption. The encryption sequence changes continuously so there is never a correlation between data sent and data received.

GrayMatter

GrayMatter

GrayMatter provides Advanced Industrial Analytics, OT Cybersecurity, Digital Transformation and Automation & Control services to clients across the U.S. and Canada.

Scalarr

Scalarr

Scalarr is an innovative, next-generation cyber security firm focused on automation and AI to detect and prevent threats in mobile and Edge/IoT infrastructures.

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre is the jurisdiction's Cyber Emergency Response Team (CERT) and national technical authority for cyber security.