BUSINESS > Services > IT & Telecoms


« Back to News

2021-11-09

The Value Of Network Pen Testing To Reduce Cyber Attacks

To make better decisions about cyber security you need to know your vulnerabilities - understanding your threat landscape is essential to stay safe.

2021-11-06

NSO Spyware Is On US Trade Blacklist

The US has banned two Israeli spyware companies, NSO Group and Candiru, adding to the list of companies selling malicious surveillance tools.

2021-11-02

Internet Phone Providers Under Attack

British VoIP providers have been targeted with DDoS attacks in a large scale coordinated campaign by professional criminals focused on extortion. 

2021-10-27

British Spies Trust Amazon With Their Secrets

Britain’s most secret data will be protected by a single US technology company, as GCHQ, MI5 & MI6 contract with AWS to host classified material.

2021-10-12

How To Use Transit Gateways To Monitor Traffic

Transit gateways are a way of managing traffic via different Virtual Private Clouds and AWS accounts, making them much easier to use. By Emily Henry

2021-10-13

Don't Click On Pop-Ups

Dark Patterns are website design methods intended to collect more information and extract more cash than users intend by exploiting cookies.

2021-10-11

Massive Twitch Data Breach

Amazon's game-streaming platform Twitch, with 30m daily visitors, has been hacked, losing confidential company and user data.

2021-10-05

Data Is Your Most Valuable Asset. How Are You Protecting Yours?

Backup: Keeping a copy of data is not sufficient, you need an effective system that can protect and support it, everywhere. By Colin Tankard

2021-09-22

North America VPN Market Will Soon Be Worth $70 Bn

Widespread use of mobile devices and the implementation of BYOD rules are driving the rapid development of the N. American VPN market.

2021-09-14

Apple's Emergency Patch For NSO Hack

Zero Click: Apple scrambles to fix a security vulnerability that allows hackers to directly infect iPhones and other devices without any user action.

2021-09-07

Apple Delays Scanning iPhones For Child Abuse

Plans for software capable of detecting child abuse images to be built into iPhones and iOS devices have been suspended over privacy concerns.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Korea Internet & Security Agency (KISA)

Korea Internet & Security Agency (KISA)

KISA is committed to improving the competitiveness, reliability and security of Internet information and knowledge in Korea.

Dionach

Dionach

Dionach are a certified information security specialists who provide Penetration Testing, IT Security Auditing and Information Security Consultancy.

VADO Security Technologies

VADO Security Technologies

VADO Security enables the safe transfer of data between low & high security networks.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

Workz Group

Workz Group

Workz connects and protects mobile subscribers of today and tomorrow by providing secure removable or embedded SIMs and remote provisioning solutions for consumer, M2M and IOT devices.

CyberCareers.gov

CyberCareers.gov

CyberCareers.gov is a platform for Cybersecurity Job Seekers, Federal Hiring Managers and Supervisors, Current Federal Cybersecurity Employees, Students and Universities.

Kickstart

Kickstart

Kickstart supports your startup in scaling deep technology businesses in Switzerland in areas such as AI, Blockchain and Cybersecurity.

RackTop Systems

RackTop Systems

RackTop Systems is the pioneer of CyberConverged data security, a new market that fuses data storage with advanced security and compliance into a single platform.

Onfido

Onfido

Onfido is building the new identity standard for the internet. We digitally prove people’s real identities using a photo ID and facial biometrics.

Ukrainian Academy of Cyber Security (UACS)

Ukrainian Academy of Cyber Security (UACS)

UACS is a professional non-profit public organization established to promote the development of an extensive network and ecosystem of education and training in the field of cyber security.

Bleckwen

Bleckwen

Bleckwen is a proven fraud detection system that helps financial institutions build trust with customers.

Topsec Cloud Solutions

Topsec Cloud Solutions

The Topsec Managed Email Security Platform eliminates Spam, Viruses, Malware, and Phishing.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

Theta

Theta

Theta is a New Zealand owned technology consultancy. Our team of over 330 experienced professionals help organisations transform with technology.

Interlynk

Interlynk

Interlynk's #SBOM and # VEX-powered platform automates and continuously monitors first-party and vendor software supply chains and helps meet #FDA, #CRA, #GSA, and #DoD compliance obligations.