BUSINESS > Services > IT & Telecoms


« Back to News

2022-11-28

Hidden In Plain Sight

Control system cyber incidents are more numerous & damaging than you might expect - more than 17 million resulting in 34,000 deaths. By Joe Weiss

2022-11-25

Five Ways Executives Can Optimize Cyber Security Spending

The Right Tools & People: Just pouring money into cyber security does not automatically result in increased preparedness. By Lee Rossey

2022-11-25

Shifting Left In Enterprise Cloud Security

Speed Versus Safety: Companies need to invest in preventative measures to safeguard their cloud estates against cyber attacks. By Stuart Green

2022-11-26

Outsourcing IT Systems & Data Management Can Be A False Economy

Risky Business: In the connected world organisations increasingly rely on outside providers to fulfill their cyber and IT supply chain needs.

2022-12-06

Smartphones Are More Vulnerable Than You Think

Ghost Touch: Most mobile phone users of all ages have a smartphone, although few are aware quite how vulnerable these devices are to attacks.

2022-11-29

Phishing- As-A-Service

'Robin Banks' Returns: A notorious phishing-as-a-service platform has relocated its infrastructure to a criminal platform located in Russia.

2022-11-16

The Role of Zero Trust Architecture In Minimising Cyber Risks

The ZTA model creates a far more secure environment that protects against unauthorized access to sensitive data. By Dominik Birgelen

2022-11-15

Guilty: A Criminal Conviction For One CISO Has Consequence For Others

Doing The Right Thing: Uber’s ex-security chief has been found guilty in a US court - what does that mean for CISOs in the UK? By Nigel Jones

2022-11-22

Russia Prepares To Disconnect From The World Wide Web

Unplugged: The Russian government has been working on ways to monitor Russian citizens' Internet activities & block information from abroad. 

2022-11-21

Black Women Comprise Less Than 1% Of The IT Workforce

Racist & Sexist?: Black women, and women in general, working in tech are often where they are despite the lack of inclusive working culture.

2022-11-07

Japan Will Use AI To Secure Critical Infrastructure

Risk Based Maintenance: Using cloud-hosted SaaS software based on a decentralized database and distributed ledger technology.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

JumpCloud

JumpCloud

JumpCloud's Directory-as-a-Service (DaaS) is the single point of authority to authenticate, authorize, and manage the identities of a business’s employees and the systems and IT resources they need.

CSR Privacy Solutions

CSR Privacy Solutions

CSR Privacy Solutions is a leading provider of privacy regulatory compliance programs for small and medium sized businesses.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

Excellium Services

Excellium Services

Excellium’s Professional Services team combines expertise and experience that complements your in-house security resources.

GreenWorld Technologies

GreenWorld Technologies

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

US Cyber Range

US Cyber Range

US Cyber Range is a scalable, cloud-hosted infrastructure providing students with virtual environments for realistic, hands-on cybersecurity labs and exercises.

DataPassports

DataPassports

DataPassports is a data-centric security and privacy solution that enforces privacy and security from end-to-end with transparent protection of data at the source.

Urbane Security

Urbane Security

Urbane Security is a premier information security consultancy empowering the Fortune 500, small and medium enterprise, and high-tech startups.

iON United

iON United

iON United is a full-service IT security solutions provider and one of the most trusted names in cybersecurity in Canada.

Conversant Group

Conversant Group

Conversant Group is an IT infrastructure and security consulting company, providing technical, organizational, procedural, and process consulting internationally.

Forta

Forta

Forta is a real-time detection network for security & operational monitoring of blockchain activity.

Digital Edge

Digital Edge

Digital Edge provides unparalleled Managed Cloud Solutions, as well as superior Information Technology Support Services.

Oligo Security

Oligo Security

Oligo aims to streamline the usage of open source by making it secure and easy to protect. Through focusing developers on the relevant vulnerabilities we make the fixing process significantly shorter.

CIP Cyber

CIP Cyber

CIP Cyber is an online learning community with a mission of connecting, training, and certifying cybersecurity professionals to protect critical infrastructure.