BUSINESS > Services > IT & Telecoms


« Back to News

2023-11-29

Supply Chain Attack On British Law Firms

Specialist Managed Service Provider Outage: As many as 200 firms were left unable to access phone calls, emails, or case management systems.

2023-11-27

Creating A Top-Notch Financial App With Advanced Cybersecurity

The Ultimate Guide: What is the current role of cybersecurity in FinTech and what standards are better to opt for? By Serge Khmelovskyi

2023-11-27

Securing National Communications Infrastructure

Digital Connections: Network disaggregation is vital to protecting critical telecoms infrastructure against external threats. By Richard Brandon

2023-11-17

Four Reasons To Use A Dedicated IP In 2023

Elevate Online Security With A Dedicated IP: Better email deliverability, a lower chance of getting blacklisted & it’s essential for remote workers.

2023-11-01

Is OAuth Authentication Secure?

Open Authorization Mitigation Strategies: A powerful tool for modern web security that needs to be used properly to reach its full potential.

2023-10-31

Defenders Of The Cybersecurity Command Centre  

The SecOps Team: Serving as the frontline by protecting the digital fortress from the myriad of tools available to threat actors. By Fabien Rech

2023-10-24

The Latest Trends In Email Threats

Callback Phishing & Malware Delivered Via Google Drive: Email threats remain one of the major sources of trouble for cybersecurity teams.

2023-10-23

ZTNA Is The Foundation Of Great VDI Deployments

Virtual DeskTop Infrastructure: Ensuring security in hosted desktop architectures can be a challenge. Zero Trust is the solution. By Karen Gondoly

2023-10-17

SIM Swapping Cyber Crime 

SIM card duplication is a specialised form of fraud, enabling identity theft, impersonation and other crimes, with serious consequences for victims.

2023-10-17

Out-Sourcing Can Compromise Cyber Security

Out-sourcing cyber security can save company costs and access specialized skills. But there are several risks, like vendor lock-in & non-compliance.

2023-10-06

Safeguarding Businesses From Security Challenges In Advertising

Navigating The Pitfalls Of Google’s AI Data Privacy: Giving up control over ad placement is convenient, but carries several risks. By Mathew Ratty

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

QASymphony

QASymphony

QASymphony software testing and QA tools help companies create better software by improving speed, efficiency and collaboration during the testing lifecycle.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

Kount

Kount

Kount's “decision engine” platform is ideal for managing fraud in online/telephone channels that process payments and onboard new customers.

Hedgehog Security

Hedgehog Security

The key objective of Hedgehog is to provide simple, effective and affordable information security improvements that support your drive to increase productivity and profitability.

NTOP

NTOP

NTOP develop high-quality network traffic analysis and DDoS protection software used by small individuals as well by large telecom operators.

Think Cyber Security (ThinkCyber)

Think Cyber Security (ThinkCyber)

ThinkCyber is a Tel Aviv-based Israeli company with a team of cybersecurity professionals who are experts in both information and operations technology.

Xage Security

Xage Security

Xage is the world’s first blockchain-protected security platform for Industrial IoT.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

MrLooquer

MrLooquer

MrLooquer provide a solution to automatically discover the assets of organizations on the internet, determine the level of exposure to attacks and help to manage risk accurately.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

Elysium Analytics

Elysium Analytics

Elysium Cognitive Security Analytics delivers the latest and most flexible security system to reduce cost and complexity while providing unmatched scalability.

Securd

Securd

Securd takes opportunities away from your cyber adversaries. Cloud-delivered zero-trust DNS firewall and web filtering protection keep your business network and remote employees safe.

OwnBackup

OwnBackup

OwnBackup proactively prevents you from losing mission-critical data and metadata with automated backups and rapid, stress-free recovery.

Analog Devices Inc (ADI)

Analog Devices Inc (ADI)

Analog Devices is uniquely positioned to deliver security at the edge, where the data is born, because our sensor solutions convert the physical, analog world into the digital world.

Comparitech

Comparitech

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware.

Fortiedge

Fortiedge

Fortiedge is an IT Security solution provider specializing in Cyber Security practices and solutions for our clients.