BUSINESS > Services > IT & Telecoms


« Back to News

2025-07-29

Persistent Threats & The Growing Role Of AI In Cloud Security

A dual dynamic - where AI empowers both attackers and defenders - demonstrates the urgency for organisations to adopt robust countermeasures.

2025-07-28

Serious Security Problems With Microsoft’s SharePoint Servers

Update: Chinese hackers have exploited vulnerabilities in on-premises MS SharePoint document servers. Cloud-based services are not affected.

2025-07-24

Software Vulnerabilities: What Are They and Can They Be Fixed?

A software vulnerability is a weak structural design element that can be weaponized by malevolent actors, to compromise the system’s functionality.

2025-07-22

Why Choosing The Right Business Internet Services Matters

Choosing an internet provider based on speed alone is not enough. You want a connection that holds up and gets things done without fuss.

2025-07-15

How CIOs Can Deliver Successful AI Implementations In 2025 

Overwhelmed: Advice for CIOs who are tasked with managing AI deployment alongside a business’ foundational IT operations. By Joel Carusone

2025-07-12

Cyber Criminals Mislead Corporate Workers To Steal Google Credentials

Malicious Semrush Google Ads Reel In Victims: Stolen credentials are the entry point for interactive remote control capabilities. By Nick Ascoli

2025-07-14

Browser Extensions Malware Affects Millions Of Users

RedDirection: Browser extensions, which were previously considered safe, are found to have been covertly updated to include harmful code.

2025-07-10

GitHub Exploited In Sophisticated Malware Campaign

Malware Disguised As A VPN App: Increasing reliance on open-source repositories calls for much higher-levels of vigilance for deceptive tactics.

2025-07-09

Ingram Micro Grapples WIth SafePay Ransomware Attack

The attack has sent ripples through the global IT supply chain, highlighting vulnerabilities in even the most trusted technology organisations.

2025-07-07

An Organisation’s Responsibility Following A Data Leak

Empathy & Action: Data breaches are serious events that affect real people, not just abstract statistics. By Wouter Klinkhamer

2025-07-01

Using Cloud & Unified Communications To Enhance Collaboration & Productivity

CCaS: Unified cloud communications bring together multiple tools on a single platform, enabling seamless, real-time collaboration from anywhere.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

National Association of Software and Services Companies (NASSCOM) - India

National Association of Software and Services Companies (NASSCOM) - India

NASSCOM is a trade association of Indian Information Technology and Business Process Outsourcing industry. Areas of activity include cyber security.

Centurion Information Security

Centurion Information Security

Centurion Information Security is a consulting firm based in Singapore that specialises in penetration testing and security assessment services.

CyberGreen Institute

CyberGreen Institute

The CyberGreen Institute is a global non-profit and collaborative organization conducting activities focused on helping to improve the health of the global Cyber Ecosystem.

Merlin Cyber

Merlin Cyber

Merlin is a premier cybersecurity platform that leverages security technologies, trusted relationships, and capital to develop and deliver groundbreaking security solutions.

Trustonic

Trustonic

Trustonic is a leader in the device security market. Our mission is to protect apps, secure devices & enable trust.

CyberSecurity Non-Profit (CSNP)

CyberSecurity Non-Profit (CSNP)

CyberSecurity Non-Profit (CSNP) is a 501(c)(3) non-profit organization dedicated to promoting cybersecurity awareness and education.

Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation Hub (BDIH)

The aim of the BDIH initiative is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of industry 4.0.

Ensighten

Ensighten

Ensighten is a leader in Website Security & Privacy Compliance. Protect your website from malicious attacks, monitor & detect vulnerabilities, protect consumer data.

StartupXseed Ventures

StartupXseed Ventures

StartupXseed Ventures is a smart capital provider for Deep Tech, B2B, Early Stage Startups. We support, NextGen Tech Entrepreneurs, who have potential to deliver the outsized growth.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

Netizen

Netizen

Netizen is an award-winning company that develops and leverages innovative solutions to enable a more secure cyberspace for clients in government and commercial markets.

Alcon Maddox

Alcon Maddox

Alcon Maddox is a niche recruitment and executive search firm specialised in sourcing exceptional Cyber Security sales and commercial leadership talent. Serving clients across the Middle East & Europe

CyberScotland

CyberScotland

The CyberScotland Partnership is a collaboration of key strategic stakeholders, brought together to focus efforts on improving cyber resilience across Scotland in a coordinated and coherent way.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

DataProof Communications

DataProof Communications

DataProof Communications is Cybersecurity Company specialising in cybersecurity operations, incident management and response best practices and technologies.