BUSINESS > Services > IT & Telecoms


« Back to News

2025-05-12

What Is An SPF Record For Email?

Sender Policy Framework: With more businesses relying on email every day, a properly configured SPF record isn’t optional, it's a must.

2025-04-28

Cybersecurity Risks In Legacy Scheduling Systems & How To Mitigate Them

Scheduling Software: Relying on legacy systems without actively investing in updates and patches can open businesses to cybersecurity risks.

2025-04-28

Chinese Hackers Exploiting Ivanti Connect Secure Vulnerability 

Ivanti has confirmed that a stack-based buffer overflow in Ivanti Connect Secure, Policy Secure & ZTA Gateways can lead to remote code execution.

2025-04-22

Google's Online Advertising Technology Ruled Illegal

Monopoly Power: Google faces the possibility of US courts ordering it to sell assets or change its business practices to avoid anti-trust violations.

2025-04-17

Protecting Your Website From SEO Fraud

Effective Tips To Know About: If you become the victim of SEO fraud there can be unpleasant consequences for both your credibility & reputation.

2025-04-14

Securing The Cloud: The Role Of DevOps Programmers & Azure Engineers In Modern Cybersecurity

Automation Scales Decisions. People Guide Them: Combining DevOps with Azure cloud security is appealing to enterprise and mid-sized orgs.

2025-04-09

On Trend With Zero-Trust Architecture & Multi-Cloud Environments

Security management is shifting, with changes in cloud platform adoption, deployment of firewalls and Software-Defined Wide Area Networks.

2025-04-04

Staying Secure, Skilled & Sustainable

The IT Balancing Act: Three key areas are shaping the IT industry - Cybersecurity, AI & Cloud adoption, and Sustainability. By Martin Hodgson

2025-04-05

Oracle Cloud Now Admits To Having Been Hacked

Update: Oracle Cloud has confirmed that it was breached in an attack which affected an obsolescent platform still being used in healthcare.

2025-03-28

Oracle Cloud Denies It Has Been Breached

Cyber security firms are taking measures to protect customers after claims of a massive attack against Oracle Cloud. Oracle denies any breach.

2025-03-31

Rethinking The Role Of Penetration Testing

Security Check Box Or Key Intelligence Tool? Too many companies treat penetration testing as a static, once-a-year assessment By Rajeev Gupta

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ITpreneurs

ITpreneurs

ITpreneurs provides IT training content, Instructors, Learning Infrastructure and services to IT Training providers.

Marsh

Marsh

Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.

ThaiCERT

ThaiCERT

ThaiCERT is the national Computer Security Incident Response Team (CSIRT) for Thailand.

A-SIT Secure Information Technology Center

A-SIT Secure Information Technology Center

A-SIT was founded in 1999 as a registered nonprofit association and is established as a competence center for IT-Security.

Siepel

Siepel

Siepel manufactures high quality shielded rooms and anechoic chambers dedicated to TEMPEST, NEMP & HIRF.

CyberDef

CyberDef

CyberDef is a consulting company specialising in cyber defence services for small and medium enterprises.

Cyberstarts

Cyberstarts

Cyberstarts’ vision is to become the leading platform for amazing teams of entrepreneurs to solve the next big problems of the cybersecurity world.

Nu Quantum

Nu Quantum

Nu Quantum is developing quantum photonics hardware to power the quantum revolution in communications, sensing and computing.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

PrivacySavvy

PrivacySavvy

PrivacySavvy's mission is to provide you with all the information that you need to ensure that your internet privacy is intact, your devices are secure, and that any time you step online, you’re safe.

AdEPT Technology Group

AdEPT Technology Group

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK.

Hyperproof

Hyperproof

Hyperproof is a cloud-based compliance operations software. Launch new programs immediately, collect evidence automatically, and manage a compliance program intelligently.

QAlified

QAlified

QAlified offer independent testing and quality assurance services for software projects including security testing.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

Apura Cybersecurity Intelligence

Apura Cybersecurity Intelligence

Apura is a Brazilian company that develops advanced products and provides specialized services in information security and cyber defense.

SafeLiShare

SafeLiShare

SafeLiShare’s data security platform unifies encryption strategies for organizations with hybrid and multi-cloud infrastructures, ensuring data is secure regardless of its location.