BUSINESS > Services > IT & Telecoms


« Back to News

2023-01-30

Turla Hackers Deliver Andomeda Malware 

Andromeda is typically deployed by hackers using an infected USB drive and is most frequently used for malware delivery and credentials theft.

2023-01-30

Microsoft To Invest $10b In OpenAI 

Generative Artificial Intelligence: Microsoft is planning to make a massive startup investment in the company behind ChatGPT and DALL·E.

2023-01-24

Cloud-Based Security Solutions Are On The Up

There are significant financial & functional advantages which are driving investment in cloud-based security solutions in 2023. By Vivek Daga

2023-01-21

T-Mobile Hacker Exposes 37m Customers' Personal Data

Unfortunately Not Immune: T-Mobile has disclosed seven major breaches since 2018 and the latest event may be one of the biggest of all time.

2023-01-20

The Advantages Of Using A VPN 

VPNs are not the silver bullet to make you invincible on the Internet, but they’re a helpful addition to security & privacy. By Milos Djordjevic

2023-01-20

Perfectly Coded APIs Can Be Susceptible To Attack

A False Sense Of Security: Even if an API is perfectly coded, inventoried & tested, it can still be probed and compromised. By Andy Mills

2023-01-19

Cyber Security Issues For The Mobile Industry

Expert Comment: Business leaders from across the Mobile industry share their predictions for cyber security issues in 2023. By Dario Betti

2023-01-19

Building An Identity-First Security Strategy

Going Beyond The NIS2 Directive: Effectively protecting identities, both human and machine, is a top priority for enterprises. By Tim Callan

2023-01-10

Zero Trust In (remote) Access

Caution Is Better Than Indulgence: Zero trust offers small companies a level of security equivalent to that of large enterprises. By Paddy Srinivasan

2023-01-09

Spying On Mobile Phone Calls

EarSpy: Smartphone manufacturers’ efforts to improve audio in their devices has led to new vulnerabilities, including unprotected earspeakers.

2023-01-03

Security Risks In 5G Mobile

Insecure By Design: 5G network slicing offers a widespread threat that includes potential weak points in policy, standards & supply chains.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

SSL247

SSL247

SSL247 is Europe's leading Web Security Consultancy Firm. We enjoy long-standing partnerships with Certificate Authorities including Symantec, GlobalSign, Entrust Datacard, Comodo, Thales and Qualys.

Paraben

Paraben

Paraben provides digital forensics solutions for mobile devices, smartphones, email, hard drives, and gaming system.

Cyber Defense Media Group (CDMG)

Cyber Defense Media Group (CDMG)

CDMG is the leading global media group for all things cyber defense.

Veracode

Veracode

Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications.

LRQA

LRQA

LRQA are a leading global assurance provider, bringing together unrivalled expertise in certification, brand assurance, cybersecurity, inspection and training.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

Cybersecurity Professionals

Cybersecurity Professionals

Search vacancies from top cyber security jobs worldwide on CyberSecurity Professionals. View IT security jobs or upload your CV to be seen by recruiters from industry leading firms.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

oneclick

oneclick

oneclick is a central access and distribution platform in the cloud, enabling the management of the entire technology stack for application provisioning.

Sylint

Sylint

Sylint is an internationally recognized cyber security and digital data forensics firm with extensive experience discretely addressing some of today’s biggest cyber breaches.

Twingate

Twingate

Twingate help organizations secure and manage access to their technology resources in a world where people work from anywhere.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji) (formerly known as HLB Crosbie & Associates) is a well-established firm of accountants and business advisers in Fiji.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.