BUSINESS > Services > IT & Telecoms


« Back to News

2023-12-27

The Next Generation Of Cloud Security

Cloud-Native Application Protection Platform: A package of security tools that helps safeguard your data & applications in the cloud.

2023-12-19

Microsoft Takes Action To Stop Sales Of Fake Accounts

Cybercrime As A Service: Millions of fake Microsoft accounts and tools delivered via a network of bogus websites and social media pages.

2023-12-14

Five Tips for Securing Your CI/CD Pipeline

Continuous Integration & Continuous Deployment: As software applications grow more complex, their security has become more challenging.

2023-12-14

Ukrainian Mobile Operator Suffers A Large-Scale Cyber Attack 

24 Million Users: Ukraine's largest mobile network, Kyivstar, suffered a massive cyber attack, knocking the service offline for an extended period.

2023-12-04

Trouble At Three

Thousands of Three mobile customers in the UK say they could not get signal on their phones over the weekend and the problem is persisting.

2023-11-29

Supply Chain Attack On British Law Firms

Specialist Managed Service Provider Outage: As many as 200 firms were left unable to access phone calls, emails, or case management systems.

2023-11-27

Creating A Top-Notch Financial App With Advanced Cybersecurity

The Ultimate Guide: What is the current role of cybersecurity in FinTech and what standards are better to opt for? By Serge Khmelovskyi

2023-11-27

Securing National Communications Infrastructure

Digital Connections: Network disaggregation is vital to protecting critical telecoms infrastructure against external threats. By Richard Brandon

2023-11-17

Four Reasons To Use A Dedicated IP In 2023

Elevate Online Security With A Dedicated IP: Better email deliverability, a lower chance of getting blacklisted & it’s essential for remote workers.

2023-11-01

Is OAuth Authentication Secure?

Open Authorization Mitigation Strategies: A powerful tool for modern web security that needs to be used properly to reach its full potential.

2023-10-31

Defenders Of The Cybersecurity Command Centre  

The SecOps Team: Serving as the frontline by protecting the digital fortress from the myriad of tools available to threat actors. By Fabien Rech

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Leibniz-Rechenzentrum (LRZ)

Leibniz-Rechenzentrum (LRZ)

The LRZ supports ground-breaking research and teaching in a wide range of scientific disciplines including information security and data protection.

S21sec

S21sec

S21sec is a leading European pure play cybersecurity consultancy, services and solutions provider.

CyberOne

CyberOne

CyberOne (formerly Comtact) offer a full stack cybersecurity service to ensure our customers understand the cyber maturity of their organisation.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

SecuDrive

SecuDrive

SecuDrive, provides hardware encrypted external storage devices to protect a company’s sensitive and important data.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

Alpine Cyber Solutions

Alpine Cyber Solutions

Alpine Cyber is a Managed IT Service Provider focused on cybersecurity and cloud services.

Rizikon Assurance

Rizikon Assurance

Rizikon Assurance is an Online System that improves Third-Party Assurance and Risk Management, through efficiency, automation and better visibility.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

MONITORAPP

MONITORAPP

MONITORAPP is responsible for complete web security. Protect your business environment with Application Security Solutions from MONTORAPP.

Maven Security Consulting

Maven Security Consulting

Maven Security Consulting helps companies secure their information assets and digital infrastructure by providing a wide range of customized consulting and training services.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

Udacity

Udacity

Udacity's mission is to train the world’s workforce in the careers of the future. Our programs range from beginner to expert levels and deliver the hands-on skills for real-world expertise.

LogicGate

LogicGate

The LogicGate Risk Cloud™ is an agile GRC cloud solution that combines powerful functionality with intuitive design to enhance enterprise GRC programs.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.

SafeAeon

SafeAeon

SafeAeon is a leading Cybersecurity-as-a-Service provider, offering 24x7 premium Managed Security Services with AI-powered and Human-driven 24x7 SOC.