BUSINESS > Services > Consulting


« Back to News

2025-01-17

Tackling Cyber Threats In The Public Sector

Phishing-Resistance Is Key: Public sector organisations need to have the necessary tools to protect against cyber threats. By Niall McConachie

2024-12-11

Ransomware Criminals Claim To Have Stolen Deloitte's Data

Brain Cipher: Spear phishing specialists say they have hacked the leading multinational professional services firm. Deloitte say otherwise.

2024-04-12

Helping CISOs Embrace Artificial Intelligence

Centre Of Excellence: Delivering AI-focused cybersecurity consulting services & products to help clients harness the power of AI in the organisation.

2023-07-17

SCADA Is Dead, Or Is It?

Advanced Manufacturing: The traditional automation pyramid has collapsed and the next generation of solutions has arrived. By Stefan Reuther

2023-07-07

Discovered - High Risk Vulnerabilities Affecting A Leading Building Management System

Common Vulnerabilities & Exposures: An unintended vulnerability, built into the operating system, might allow attackers remote access.

2022-10-19

The Dangers Of Inadequate Data Disposal

Delete: Failure to properly dispose of redundant IT equipment can lead to data breaches, violate data protection laws and risk financial fraud.

2021-08-16

Ransomware Attack On Accenture

If a global business consulting firm like Accenture can fall victim to a known ransom method like Lockbit, then hardly any business is secure.

2020-12-07

In The Age of Risk, Cyber Security Is The Leading Concern

A top insurance CEO says that Cyber Security is the most pressing exposure for business, more than the Coronavirus and climate change.

2020-09-01

Boards Should Insist On A Cyber Audit

Corporate boards are pivotal in improving the levels of company-wide cyber security and are responsible for managing cyber security resilience.

2020-01-27

How To Develop A Cyber Security Practice

The potential business opportunity from rising compliance requirements and security threats is hard to ignore. Here are some recommendations.

2019-11-25

'Cyber Ranges' Improve Corporate Security

Accenture has started offering clients practice Cyber Ranges in which companies can test how well they respond to simulated cyber attacks.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DriveLock

DriveLock

Our security solution is designed to prevent external attacks, which are evermore sophisticated as well as monitor, document and even prevent internal incidents.

Yubico

Yubico

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts.

Tymlez Software & Consulting

Tymlez Software & Consulting

Tymlez Software and Consulting is a start-up specialised in blockchain technology for enterprises.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

TechGuard Security

TechGuard Security

TechGuard Security was founded to address national cyber defense initiatives and US critical infrastructure security.

Coursera

Coursera

Coursera provides universal access to the world’s best education, partnering with top universities and organizations to offer courses online. Subject areas include Computer Security & Networks.

Havelsan

Havelsan

HAVELSAN is a leading technology company in Turkey developing indigenous systems for domestic and foreign military, public and private sector clients.

Emirates International Accreditation Center (EIAC)

Emirates International Accreditation Center (EIAC)

EIACI is the national accreditation body for the United Arab Emirates. The directory of members provides details of organisations offering certification services for ISO 27001.

Gradcracker

Gradcracker

Gradcracker is THE careers website for Science, Technology (including Cybersecurity), Engineering and Maths university students in the UK.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

Nomios

Nomios

Nomios develops innovative solutions for your security and network challenges. We design, secure and manage your digital infrastructure.

Suffescom Solutions

Suffescom Solutions

Suffescom Solutions is a leading blockchain development company, assisting businesses in harnessing the true potential of blockchain technology.

Ping Identity

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom.

SecurEnvoy

SecurEnvoy

SecurEnvoy are a leader in designing zero access trust solutions using the latest cutting-edge technologies, to protect your users, devices and data, whatever the location.

OpenAI

OpenAI

OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.

UMCA Technologies

UMCA Technologies

UMCA Technologies provide an AI-based solution that helps financial institutions reduce and block fraudulent financial transactions and prevent account takeovers in real time.