BUSINESS > Services > IT & Telecoms


« Back to News

2025-07-29

Persistent Threats & The Growing Role Of AI In Cloud Security

A dual dynamic - where AI empowers both attackers and defenders - demonstrates the urgency for organisations to adopt robust countermeasures.

2025-07-28

Serious Security Problems With Microsoft’s SharePoint Servers

Update: Chinese hackers have exploited vulnerabilities in on-premises MS SharePoint document servers. Cloud-based services are not affected.

2025-07-24

Software Vulnerabilities: What Are They and Can They Be Fixed?

A software vulnerability is a weak structural design element that can be weaponized by malevolent actors, to compromise the system’s functionality.

2025-07-22

Why Choosing The Right Business Internet Services Matters

Choosing an internet provider based on speed alone is not enough. You want a connection that holds up and gets things done without fuss.

2025-07-15

How CIOs Can Deliver Successful AI Implementations In 2025 

Overwhelmed: Advice for CIOs who are tasked with managing AI deployment alongside a business’ foundational IT operations. By Joel Carusone

2025-07-12

Cyber Criminals Mislead Corporate Workers To Steal Google Credentials

Malicious Semrush Google Ads Reel In Victims: Stolen credentials are the entry point for interactive remote control capabilities. By Nick Ascoli

2025-07-14

Browser Extensions Malware Affects Millions Of Users

RedDirection: Browser extensions, which were previously considered safe, are found to have been covertly updated to include harmful code.

2025-07-10

GitHub Exploited In Sophisticated Malware Campaign

Malware Disguised As A VPN App: Increasing reliance on open-source repositories calls for much higher-levels of vigilance for deceptive tactics.

2025-07-09

Ingram Micro Grapples WIth SafePay Ransomware Attack

The attack has sent ripples through the global IT supply chain, highlighting vulnerabilities in even the most trusted technology organisations.

2025-07-07

An Organisation’s Responsibility Following A Data Leak

Empathy & Action: Data breaches are serious events that affect real people, not just abstract statistics. By Wouter Klinkhamer

2025-07-01

Using Cloud & Unified Communications To Enhance Collaboration & Productivity

CCaS: Unified cloud communications bring together multiple tools on a single platform, enabling seamless, real-time collaboration from anywhere.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

OneLogin

OneLogin

OneLogin simplifies identity management with secure, one-click access,for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications.

IntelliGO Networks

IntelliGO Networks

IntelliGO Networks is a cybersecurity company focused on Managed Detection and Response (MDR).

MailGuard

MailGuard

MailGuard delivers a full suite of security solutions across email and web to protect your business before threats reach your environment.

Rewertz

Rewertz

Rewterz is a cyber security company based out of Dubai, serving customers in UAE, Oman, Qatar, Bahrain, Saudi Arabia, and Pakistan.

SafeLogic

SafeLogic

SafeLogic provides strong encryption products for solutions in mobile, server, Cloud, appliance, wearable, and IoT environments that are pursuing compliance to strict regulatory requirements.

CYE

CYE

Utilizing data, numbers, and facts, CYE helps security leaders know what business assets are at risk and execute cost-effective remediation projects for optimal risk prevention.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

Founder Shield

Founder Shield

Founder Shield is a data driven insurance brokerage focused excusively on rapidly evolving high-growth companies.

Point Predictive

Point Predictive

Point Predictive build Predictive Models using Artificial Intelligence and Machine Learning techniques that help our customers stop fraud and early payment default (EPD).

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

Limes Security

Limes Security

Limes Security GmbH is the leading OT Security expert in the German-speaking region of Europe.

ViewDS Identity Solutions

ViewDS Identity Solutions

ViewDS Identity Solutions develops innovative identity software including cloud identity management solutions, directory services, access and authorization management solutions.

Glasstrail

Glasstrail

Glasstrail are single-minded about helping organisations gather intelligence and manage vulnerabilities in their attack surface before adversaries exploit them.

Pointsharp

Pointsharp

Pointsharp delivers software and services that help organizations secure data, identities, and access in a user-friendly way.

CERT.ar

CERT.ar

CERT.ar is the national Computer Emergency Response Team for the technical-administrative management of computer security incidents in the National Public Sector of Argentina.

Blackwired

Blackwired

Blackwired has established a new category in cyber security with an intelligence-led model based on the USMC’s Combat Hunter programme ‘Left of Bang’.