BUSINESS > Services > IT & Telecoms


« Back to News

2022-07-25

Millions Of Canadian Households & Businesses Offline

Network Upgrade Failure: More than 10 million customers of Rogers Communications were knocked offline in a 19-hour nationwide outage.

2022-07-18

Apple Will Block Spyware Attacks

Lockdown Mode: Apple has announced that it will introduce a new security feature on all iOS devices to protect high-risk users against spyware.

2022-07-18

Conversational Commerce Is Going To Be Big - But Could Be Risky

Cyber security threats are emerging as more people are using mobile messaging platforms to shop & contact customer services. By Dario Betti

2022-07-06

Google Improves Password Manager Platform Security

Google Password Manager users now have the same experience on Chrome, Android and iPhone and can manage their passwords using iOS.

2022-07-06

Global Government Spending On IT To Grow 5%

Global government IT spending is forecast to be $565.7 billion in 2022, an increase of 5% from 2021, and cloud solutions will take a bigger share.

2022-07-11

Bluetooth Devices Can Covertly Track Mobile Users

A Significant Privacy Risk: Your smartphone & laptop give off unique Bluetooth radio signals that can be identified and used to track your location. 

2022-06-28

Edge AI: The Future of Artificial Intelligence And Edge Computing

Forward-thinking companies and cloud providers see new opportunities in the integration of edge computing and AI. By Helen Wilson

2022-06-08

Deactivated Domains Used For Spear-Phishing

Numerous domains used by Iranian hackers to enable a spear-phishing campaign to target devices and exfiltrate stolen information are shut down.

2022-06-13

Zoom Can Expose You To Cyber Attacks

The video-conference platform Zoom has disclosed four new software problems and vulnerabilities that can expose users to cyber attacks.

2022-05-25

Satellite Systems Security Needs To Be Reinforced Against Cyber Attack

Cyberspace is the 'soft underbelly' of satellite communications systems and the real vulnerabilities exist on the ground rather than in space.

2022-05-23

CISA Detect Vulnerabilities In VMWare Products

Random Disconnection: CISA says unpatched VMWare devices should be considered to be compromised and need to be urgently checked.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Swivel Secure

Swivel Secure

Swivel Secure is an award winning provider of multi-factor authentication solutions.

Q-CERT

Q-CERT

Q-CERT is the National Computer Security Emergency Team of Qatar.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

ControlScan

ControlScan

ControlScan is a Managed Security Services Provider (MSSP) - our primary focus is protecting your business and securing your sensitive data.

Information Systems Security Partners (ISSP)

Information Systems Security Partners (ISSP)

ISSP is a specialized system integrator focused on the information security needs of its corporate clients and providing best in class products and services for securing organizational information.

CopSonic

CopSonic

Copsonic provide a technology solution based on ultrasonic waves to send secure and encrypted data between two devices in order to achieve authentication.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

Wizard Cyber

Wizard Cyber

At Wizard Cyber, we simplify cyber security, delivering an advanced service that protects your high-risk assets from the complex threats that technology alone can miss, 24/7.

Aware

Aware

Aware is the only comprehensive AI solution for governance, risk, compliance and insights for leading collaboration platforms.

CornerStone

CornerStone

CornerStone is an award winning, independent risk, cyber and security consulting firm providing a range of Risk Management, Security Design and Implementation Management Services.

Normalyze

Normalyze

Normalyze are solving some of the most painful problems enterprise IT security teams face in the cloud and data security space. We help enterprises protect all the data they run in the cloud.

Cisco Systems

Cisco Systems

Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.

Trovent Security

Trovent Security

Trovent was founded with a clear goal: to support medium-sized companies in significantly increasing their IT security level.

Robosoft Technologies

Robosoft Technologies

Robosoft Technologies is a full-service digital transformation partner. We provide end-to-end digital transformation services in areas including cybersecurity.

12Port

12Port

12Port network security solutions help companies tackle modern cybersecurity threats cost-effectively while implementing zero-trust architectures.