BUSINESS > Services > IT & Telecoms


« Back to News

2023-11-17

Four Reasons To Use A Dedicated IP In 2023

Elevate Online Security With A Dedicated IP: Better email deliverability, a lower chance of getting blacklisted & it’s essential for remote workers.

2023-11-01

Is OAuth Authentication Secure?

Open Authorization Mitigation Strategies: A powerful tool for modern web security that needs to be used properly to reach its full potential.

2023-10-31

Defenders Of The Cybersecurity Command Centre  

The SecOps Team: Serving as the frontline by protecting the digital fortress from the myriad of tools available to threat actors. By Fabien Rech

2023-10-24

The Latest Trends In Email Threats

Callback Phishing & Malware Delivered Via Google Drive: Email threats remain one of the major sources of trouble for cybersecurity teams.

2023-10-23

ZTNA Is The Foundation Of Great VDI Deployments

Virtual DeskTop Infrastructure: Ensuring security in hosted desktop architectures can be a challenge. Zero Trust is the solution. By Karen Gondoly

2023-10-17

SIM Swapping Cyber Crime 

SIM card duplication is a specialised form of fraud, enabling identity theft, impersonation and other crimes, with serious consequences for victims.

2023-10-06

Safeguarding Businesses From Security Challenges In Advertising

Navigating The Pitfalls Of Google’s AI Data Privacy: Giving up control over ad placement is convenient, but carries several risks. By Mathew Ratty

2023-10-06

Top Five Cloud Penetration Testing Tools

Cloud penetration testing is focused exclusively on cloud infrastructure. What are the current best tools & methodology? By Vidushi Dubey

2023-10-06

Cyber Criminals Exploit Legitimate Software

Remcos & GuLoader: Research has found malicious trojans packaged with legitimate software widley available from criminally complicit vendors.

2023-09-26

Severe Risks From Remote Access Exposure

Response Time: Organisations are finding it difficult to manage their attack surfaces at a speed & scale necessary to combat threat actor automation.

2023-09-20

The Worst Places To Connect To Public Wi-Fi

If your employees use public Wi-Fi networks, there is a high chance of malware infection. How can you protect both your people and your business?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Bishop Fox

Bishop Fox

Bishop Fox is a leading authority in offensive security, providing solutions ranging from continuous penetration testing and attack surface management to product and application security assessments.

NXP Semiconductors

NXP Semiconductors

NXP is a world leader in secure connectivity solutions for embedded applications and the Internet of Things.

Conscia

Conscia

Conscia provides IT infrastructure solutions and 24/7 services in network, data center, security and mobility.

Business Continuity

Business Continuity

Business Continuity delivers integrated IT solutions for cybersecurity, virtualization, cloud platforms and operational security solutions.

Black Hills Information Security (BHIS)

Black Hills Information Security (BHIS)

Black Hills Information Security provide security testing and vulnerability assessment services.

InfoExpress

InfoExpress

InfoExpress provides network security solutions that enhance productivity and security through better visibility, improved security, and automating device and mobile access to the network.

BlackDice Cyber

BlackDice Cyber

Threat Intelligence is only part of the solution. Our solution matches threats to vulnerabilities and automatically takes remedial action against compromised apps, devices and websites.

Red Sky Alliance

Red Sky Alliance

Red Sky Alliance (Wapack Labs Corp) is a cyber threat intelligence firm that delivers proprietary intelligence data, analysis and in-depth strategic reporting.

HighGround

HighGround

HighGround offer a Cyber Security Solution for everybody, regardless of skillset, to feel empowered in their security experience in reaching Cyber Resilience.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

Cyber News Live (CNL)

Cyber News Live (CNL)

Cyber News Live provide vital information and raise awareness about all things 'cyber' to ensure you stay protected in the digital world.

aFFirmFirst

aFFirmFirst

aFFirmFirst is a unique software solution offering a simple yet effective way for businesses to protect and control their online images and logo, as well as allowing one-click website verification.

Skillfield

Skillfield

Skillfield is a Melbourne based Cyber Security and Data Services consultancy and professional services company.

C/side (cside)

C/side (cside)

At c/side, we're creating the ultimate delivery, performance and detection mechanism for browser-side fetched 3rd party Javascript.

Telenor Cyberdefence

Telenor Cyberdefence

Telenor Cyberdefence is a newly established (2024) cloud-born Managed Security Service Provider focused on the Nordic markets.

Sonar

Sonar

AI generated or written by humans, Sonar’s Clean Code Solutions cover your code quality needs, improving code reliability, maintainability, and security.