BUSINESS > Services > IT & Telecoms


« Back to News

2024-06-11

Is Encryption Falling Out Of Favour?

An alarming number of organisations have gone backwards in protecting vital information, heightening the risk of data exposure. By Jon Fielding

2024-06-07

OpenTofu's New State File Encryption Is A Boon For IaC Security

Open-source Infrastructure as Code Tool: OpenTofu's new state file encryption feature is a significant milestone for IaC security.

2024-06-03

Increasing Software Cyber Resilience

A new ‘Code of Practice for Software Vendors’ will ensure that security is fundamental to developing and distributing products and services. 

2024-06-01

A Single Attack Disabled Half A Million Routers

Details emerging about a 2023 exploit which knocked out over 600,000 routers in an unprecedented attack against a single Internet Service Provider.

2024-05-30

Email Encryption: What It Is & How It Works

Email Encryption: An essential tool that keeps users' sensitive information safe from threats like hacking, fraud, data breaches and identity theft.

2024-05-31

Telecoms - Beware Of The DDoS Threat Actor

Combatting the wave of DDoS attacks against the telecommunications industry is critical to protecting global connectivity. By Richard Hummel

2024-05-31

The Key Components Of Embedded Systems Development Services

Embedded systems development services are essential for businesses and industries seeking to leverage the power of customized & efficient systems.

2024-05-28

Seven Benefits Of Using A Managed Security Services Provider

Managed Security steps up as the superhero we didn't know we needed, shielding businesses from cyber threats. By Dmtry Kurskov

2024-05-22

IT Professionals Can Earn 35% More By Switching To AI

Career Opportunities: As businesses rush to make big investments in AI, demand for technology professionals with the right skills has tripled.

2024-05-21

Cloud Threats Require New Advanced Defenses

Surge In Cloud Security Incidents: Although cloud attacks are increasing very few organisations are able to mitigate risks easily and quickly.

2024-05-20

A Critical Vulnerability In The Post-PSTIA Era 

The Human Factor: To truly fortify our cybersecurity in this new era, we must address the elephant in the room. By James O'Sullivan

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

National Cyber Directorate Israel

National Cyber Directorate Israel

The Israeli National Cyber Directorate provides incident handling services for civilian entities and critical infrastructures and works to increase national resilience against cyber threats.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

Computest

Computest

Computest security testing services include Mobile app security, Vulnerability assessments, Attack & penetration testing, Security awareness training, Network security assessments.

BA-CSIRT

BA-CSIRT

BA-CSIRT is a center which is dedicated to assist and raise awareness among citizens and the Government of the City of Buenos Aires in everything related to information security.

Secure Soft

Secure Soft

Secure Soft are experts in Computer and Information Security with a presence in Peru, Colombia and Ecuador.

Quantifind

Quantifind

Quantifind enables financial crimes/fraud analysts and investigators to make better decisions, faster, with intelligent automation.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

Earlybird Venture Capital

Earlybird Venture Capital

Earlybird is a venture capital investor focused on European technology innovators.

InfoSystems Inc

InfoSystems Inc

InfoSystems provides reliable IT solutions to build and maintain strong and secure systems for both SMB and enterprise organizations.

Cyber Security Partners (CSP)

Cyber Security Partners (CSP)

Cyber Security Partners specialise in the provision of Cyber Security Consultancy, Data Protection and Certification and Compliance services.

Censinet

Censinet

Censinet provides the first and only third-party risk management platform for healthcare organizations to manage the threats to patient care that exist within an expanding ecosystem.

Emerge Digital

Emerge Digital

Emerge Digital is a technology and digital innovation business and Managed Services Provider providing solutions to SMEs.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.

Redcoat AI

Redcoat AI

Redcoat AI provide a comprehensive security platform that continuously evolves with the threats and opportunities presented by AI.

Btech

Btech

Btech is the market leader in providing affordable managed IT security services for credit unions.