BUSINESS > Services > IT & Telecoms


« Back to News

2022-11-25

Shifting Left In Enterprise Cloud Security

Speed Versus Safety: Companies need to invest in preventative measures to safeguard their cloud estates against cyber attacks. By Stuart Green

2022-11-26

Outsourcing IT Systems & Data Management Can Be A False Economy

Risky Business: In the connected world organisations increasingly rely on outside providers to fulfill their cyber and IT supply chain needs.

2022-12-06

Smartphones Are More Vulnerable Than You Think

Ghost Touch: Most mobile phone users of all ages have a smartphone, although few are aware quite how vulnerable these devices are to attacks.

2022-11-29

Phishing- As-A-Service

'Robin Banks' Returns: A notorious phishing-as-a-service platform has relocated its infrastructure to a criminal platform located in Russia.

2022-11-16

The Role of Zero Trust Architecture In Minimising Cyber Risks

The ZTA model creates a far more secure environment that protects against unauthorized access to sensitive data. By Dominik Birgelen

2022-11-15

Guilty: A Criminal Conviction For One CISO Has Consequence For Others

Doing The Right Thing: Uber’s ex-security chief has been found guilty in a US court - what does that mean for CISOs in the UK? By Nigel Jones

2022-11-22

Russia Prepares To Disconnect From The World Wide Web

Unplugged: The Russian government has been working on ways to monitor Russian citizens' Internet activities & block information from abroad. 

2022-11-21

Black Women Comprise Less Than 1% Of The IT Workforce

Racist & Sexist?: Black women, and women in general, working in tech are often where they are despite the lack of inclusive working culture.

2022-11-07

Japan Will Use AI To Secure Critical Infrastructure

Risk Based Maintenance: Using cloud-hosted SaaS software based on a decentralized database and distributed ledger technology.

2022-11-03

Is It Time To Consolidate Systems?

Too many businesses are managing multiple endpoints, incompatible dashboards & struggle to integrate systems with defences. By Colin Tankard

2022-11-02

How Long Does It Take Before An Attack Is Detected?

Hackers can stay around in your network for a long time - organisations may not even know they have been attacked & robbed until it is far too late.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BruCON

BruCON

Brucon is Belgiums premium security and hacking conference.

Hack in the Box Security Conference (HitBSecConf)

Hack in the Box Security Conference (HitBSecConf)

HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events feature two days of training and a two-day multi-track conference

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

FoxGuard

FoxGuard

FoxGuard develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors.

Securitybulls

Securitybulls

Securitybulls is an information security firm offering an encyclopedic penetration testing & IT security assessment service for your organization.

WISeKey

WISeKey

WISeKey is a leading cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

Totaljobs

Totaljobs

Totaljobs is the UK’s largest hiring platform. We have over 280,000 live jobs adverts on our site, helping you to find any type of job in any industry, including cybersecurity.

Beazley

Beazley

Beazley are a specialist insurer with three decades of experience in providing clients with the highest standards of underwriting and claims service worldwide.

Estio Training

Estio Training

Estio Training is a specialist digital and IT apprenticeships provider, dedicated to introducing new skills and developing existing talent in businesses across the UK.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

Sonar

Sonar

AI generated or written by humans, Sonar’s Clean Code Solutions cover your code quality needs, improving code reliability, maintainability, and security.

Cypherleak

Cypherleak

Cypherleak provide Automated Cyber Risk Monitoring & Ai powered cyber recommendations.

ecfirst

ecfirst

ecfirst's mission is to establish AI platforms and service capabilities to assess and manage client compliance with global mandates on a continual basis to secure business data and assets.