BUSINESS > Services > IT & Telecoms


« Back to News

2024-04-09

The Importance Of Formal Verification Networks For Secure Software

The challenge of eliminating widespread software vulnerabilities is an urgent problem. New approaches are needed to mitigate risk. By Fabien Chouteau

2024-04-08

The Future of VPN Technology: Emerging Trends & Innovations

Trends & Innovations: VPNs are at the forefront of securing our online experiences, and it is incredibly important to prioritize online safety.

2024-04-04

Exposed - Seventy Million AT&T Customers Personal Data

Addresses, Social Security Numbers & Passcodes: Around 73 million AT&T customers personal data has been leaked online.

2024-03-27

Why Are Enterprises Slow To Adopt Observability?

Increasing complexity means the demands on IT departments to keep their systems functioning correctly gets tougher every day. By Rob Johnson

2024-03-15

African Countries Hit By Severe Internet Disruption

Widespread Outages: Internet outages reported as multiple underwater communications cables found broken across Africa.

2024-03-05

Identifying OSS Security Risks To Safeguard Software Supply Chains

Securing Code: Safeguarding the software supply chain is a shared responsibility for developers, administrators & organisations. By Ax Sharma

2024-03-12

Wireless Security In Smart Homes Is Vulnerable

Home security devices that connect directly to a domestic WiFi network or a smart home hub can be jammed, rendering remote alarms useless.

2024-02-28

DMARC Email Validation: Cracking Down On Fraud

Google & Yahoo mail services are introducing changes starting soon that will make your inbox a safer place for both legitimate senders & recipients.

2024-02-24

Major US Mobile Network Failure

The US had a lengthy cellular outage last week with thousands reporting connectivity issues. affecting AT&T, T Mobile, Verizon and other networks.

2024-03-12

Deepfakes Deployed In Mobile Banking Malware Attacks

GoldPickaxe: Mobile malware that collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication.

2024-02-09

Pakistan Mobile Internet Is Cut Off On Election Day

Law & Order: Pakistan's government has shut down mobile calls and data services as millions of people go to the polls to vote for a new government.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Security Magazine

Security Magazine

Security, the business magazine for security executives, focuses on management issues facing top security professionals and effective solutions being employed, both physical and cyber.

Bit4id

Bit4id

Bit4id provides software and systems for security and identification based on PKI technology.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

RazorSecure

RazorSecure

RazorSecure offers products and services to enhance railway cyber security, by protecting and monitoring networks and key systems.

AnubisNetworks

AnubisNetworks

AnubisNetworks is one of Europe’s leading threat intelligence and email security suppliers.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

Consensys

Consensys

ConsenSys is a global blockchain company. We develop enterprise applications, invest in startups, build developer tools, and offer blockchain education.

IT Jobs Watch

IT Jobs Watch

IT Jobs Watch provides a concise and accurate map of the prevailing IT job market conditions in the UK.

DisruptOps

DisruptOps

Built for today’s cloud-scale enterprises, DisruptOps’ Cloud Detection and Response platform automates assessment and remediation procedures of critical cloud security issues.

Rhino Security Labs

Rhino Security Labs

Rhino Security Labs is a top penetration testing and security assessment firm, with a focus on cloud pentesting, network pentesting, web application pentesting, and phishing.

Camel Secure

Camel Secure

Camel Secure is a company specialized in the development of products for information security and technology risk management.

Armexa

Armexa

Armexa is a leading provider of advanced industrial cybersecurity solutions that protect your critical OT and ICS infrastructure against ever-changing threats.

Data Priva

Data Priva

Data Priva is the UK's leading subscription-based data protection, governance, risk and and compliance service.

Balance Theory

Balance Theory

Balance Theory provides the knowledge infrastructure and collaboration center for the cybersecurity community. A networked community to build better cybersecurity outcomes.

Center for Information Security Awareness (CFISA)

Center for Information Security Awareness (CFISA)

CFISA was formed by a group of academics, security and fraud experts to explore ways to increase security awareness among audiences, including consumers, employees, businesses and law enforcement.

Dion Training Solutions

Dion Training Solutions

Dion Training Solutions offer comprehensive training in areas such as project management, cybersecurity, agile methodologies, and IT service management.