BUSINESS > Services > IT & Telecoms


« Back to News

2023-02-18

Making A Success Of Hybrid Working

Companies need to address five key issues holding them back and ensure employees engage with collaboration tools now. By Rob Quickenden

2023-02-13

Quantum Computer Power Threatens Encryption

Quantum computers will completely transform data processing speeds and they can also be used by enemies for highly destructive modes of attack.

2023-02-08

Creating Order Out Of WAF Management Chaos

Web Application Firewall Management: How WAF rules are run & processed can provide security without sacrificing performance. By Paul McNamara

2023-01-30

Turla Hackers Deliver Andomeda Malware 

Andromeda is typically deployed by hackers using an infected USB drive and is most frequently used for malware delivery and credentials theft.

2023-01-30

Microsoft To Invest $10b In OpenAI 

Generative Artificial Intelligence: Microsoft is planning to make a massive startup investment in the company behind ChatGPT and DALL·E.

2023-01-24

Cloud-Based Security Solutions Are On The Up

There are significant financial & functional advantages which are driving investment in cloud-based security solutions in 2023. By Vivek Daga

2023-01-21

T-Mobile Hacker Exposes 37m Customers' Personal Data

Unfortunately Not Immune: T-Mobile has disclosed seven major breaches since 2018 and the latest event may be one of the biggest of all time.

2023-01-22

The Advantages Of Using A VPN 

VPNs are not the silver bullet to make you invincible on the Internet, but they’re a helpful addition to security & privacy. By Milos Djordjevic

2023-01-20

Perfectly Coded APIs Can Be Susceptible To Attack

A False Sense Of Security: Even if an API is perfectly coded, inventoried & tested, it can still be probed and compromised. By Andy Mills

2023-01-19

Cyber Security Issues For The Mobile Industry

Expert Comment: Business leaders from across the Mobile industry share their predictions for cyber security issues in 2023. By Dario Betti

2023-01-19

Building An Identity-First Security Strategy

Going Beyond The NIS2 Directive: Effectively protecting identities, both human and machine, is a top priority for enterprises. By Tim Callan

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

PlainID

PlainID

PlainID provides IAM teams with a simple and intuitive means to control their organization’s entire authorization process.

OEDIV SecuSys

OEDIV SecuSys

OEDIV SecuSys (formerly iSM Secu-Sys) develops high-quality IT software solutions, setting standards as a technology leader in the area of identity and access management.

Sapien Cyber

Sapien Cyber

Sapien Cyber is an Australian company bringing leading-edge cyber security and threat intelligence solutions.

National Forensic Sciences University (NFSU)

National Forensic Sciences University (NFSU)

National Forensic Sciences University is the world’s first and only University dedicated to Digital Forensic and allied Sciences.

CyberProof

CyberProof

CyberProof aims to give clarity and confidence to businesses worldwide using a new risk-based approach to cyber security services.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

swIDCH

swIDCH

swIDch is a technology company that aims to eliminate CNP (card not present) Fraud.

spiderSilk

spiderSilk

spiderSilk is a Dubai-based cybersecurity firm, specializing in simulating the most advanced cyber offenses on your technology so you can build your best security defenses.

AEWIN Technologies

AEWIN Technologies

AEWIN is professional in the fields of Network Appliance, Cyber Security, Server, Edge Computing and an ODM/OEM expert.

ControlMap

ControlMap

ControlMap is a software as a service platform with a mission to simplify and eliminate stress from everyday operations of modern IT compliance teams.

Appalachia Technologies

Appalachia Technologies

Appalachia is a full service Managed Services Provider with a focus on cybersecurity, backed by the best engineers.

Kobalt.io

Kobalt.io

Kobalt are bringing the monitoring capabilities of enterprise-class security teams to smaller organizations.

Pangu Laboratory

Pangu Laboratory

Beijing Qi an Pangu Laboratory Technology Co., Ltd. was established on the basis of Pangu laboratory, a well-known cyber security team.

Centre for Cyber Security Research & Innovation

Centre for Cyber Security Research & Innovation

The Centre for Cyber Security Research & Innovation is Nepal's First Academic Research Institute to focus on understanding the overall Information Security of Nepalese Organizations.

ZEUSS

ZEUSS

ZEUSS is a diversified data center, cybersecurity, and green energy company.