BUSINESS > Services > IT & Telecoms


« Back to News

2022-09-07

VPN Configuration: Understanding DNS Leaks & How to Prevent Them

VPNs are a great way to keep your browsing activity private, but you need to ensure you choose one that offers privacy protection. By Idrees Shafiq

2022-09-06

Google Issues A Warning To Gmail Users

Google’s Threat Analysis Team is warning users of its Gmail service of a hacking exploit that has left some users exposed for over a year. 

2022-08-30

Apple Patches Serious Security Flaws With iOS Update

iPhone, iPad & Mac devices users are advised to immediately install software updates that include patches to fix two zero-day vulnerabilities. 

2022-08-23

Xiaomi Phone Bug Enables Theft

A flaw in smartphone maker Xiaomi's operating software could lead to mobile transactions being disabled, replicated and forged.

2022-08-09

Unexplained Surge In Robotext Scams

Spam Text Messages: 87 billion fraudulent messages about unpaid bills, bank statements & deliveries aimed at extracting personal information.

2022-08-09

Dealing With Cyber Security Threats Is Hard Work

Cyber Security Is Hard. Technology is continually changing; cyber criminals' techniques are evolving and security is a constant challenge.

2022-08-09

Hot Competition To Build 5G In India

India's massive auction of radio spectrum for 5G telecommunications has become a fierce competition, generating bids in excess of $19 billion.

2022-08-09

US Federal Court Court IT Systems Breached

Hackers and other criminals may have had access to documents across the US Court Electronic Records and Case Management systems.

2022-08-04

Github Supply Chain Attack

Somebody cloned over 35,000 Github repositories and kept them identical to the original source code, with the addition of malicious code.

2022-08-02

Google Chrome Extension Used To Steal Emails

SHARPEXT: A N. Korean threat group is using a malicious browser extension to steal emails from Google Chrome users while they read their webmail.

2022-07-21

Google & Oracle Turn Off Servers In The Heatwave

Overheating: Google and Oracle suffered outages as cooling systems failed at London data centres affecting some cloud and other services.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Australian Information Security Association (AISA)

Australian Information Security Association (AISA)

AISA champions the development of a robust information security sector by building professional capacity and advancing the cyber security of the public, business and governments in Australia.

SecurityScorecard

SecurityScorecard

SecurityScorecard provides the most accurate security ratings & continuous risk monitoring for vendor and third party risk management.

Israel Aerospace Industries (IAI)

Israel Aerospace Industries (IAI)

IAI offers a holistic approach that provides defense forces, governments, critical infrastructures and large enterprises with end-to-end cyber security & monitoring tools.

Sysdig

Sysdig

With Sysdig teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

Dale Peterson

Dale Peterson

Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS.

Astaara

Astaara

Astaara is an integrated insurance services and risk management advisory business incorporating cyber risk advisory, underwriting and analytics.

Adit Ventures

Adit Ventures

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT.

Mitiga

Mitiga

Mitiga uniquily combines the top cybersecurity minds in Incident Readiness and Response with a cloud-based platform for cloud and hybrid environments.

VulnCheck

VulnCheck

VulnCheck helps organizations outpace adversaries with vulnerability intelligence that predicts avenues of attack with speed and accuracy.

Rezonate

Rezonate

Rezonate discovers, profiles, and protects Identities and their entire access journey to cloud infrastructure and critical SaaS applications. Preventing and stopping cyberattacks.

Apollo Secure

Apollo Secure

Apollo is an automated cybersecurity platform for startups and small businesses to achieve and maintain security compliance.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

QFunction

QFunction

QFunction works within your existing security stack to detect anomalies and threats within your data.

Intelidata Techedge Pvt. Ltd.

Intelidata Techedge Pvt. Ltd.

Intelidata are a Global Cyber Security Consultancy and Services firm that helps companies drive growth by minimizing risk and maximizing potential.

Dedagroup (Deda)

Dedagroup (Deda)

Dedagroup provide application solutions and IT services to bring innovation at the core of business processes.