BUSINESS > Services > IT & Telecoms


« Back to News

2024-01-23

Microsoft Is The Most Commonly Used Alias In Phishing Attacks 

Widespread use of AI is leading to a higher volume of phishing campaigns that will be barely distinguishable from genuine company communications.

2024-01-19

Five Security Benefits Of Application Mapping

By following the best practices for application mapping, organizations can maximize the security & efficiency of their business operations.

2024-01-18

Fujitsu Knowingly Supplied Faulty Data To The British Post Office 

Defective National IT System: Fujitsu and Post Office management concealed data problems which led to hundreds of unjust criminal convictions.

2024-01-11

Apple Will Pay Compensation For Slowing Down iPhones

Apple will pay $500 million in compensation to settle a class action lawsuit over the claims that it deliberately slowed down certain model iPhones. 

2024-01-15

Are Your AWS Databases Secure? Critical Best Practices

AWS Databases offer a scalable, reliable, and secure environment for storing & retrieving data, making them a crucial part of cloud deployments.

2024-01-12

China Cancels Encryption

Chinese researchers say the power of Quantum computing to break any form of encryption is more readily accessible than first thought.

2023-12-28

Albanian Parliament & Telecoms Operator Attacked

Iranian Hackers Claim Responsibility: Albania’s Parliament and a national telecommunications company targeted by cyber attacks.

2023-12-27

The Next Generation Of Cloud Security

Cloud-Native Application Protection Platform: A package of security tools that helps safeguard your data & applications in the cloud.

2023-12-19

Microsoft Takes Action To Stop Sales Of Fake Accounts

Cybercrime As A Service: Millions of fake Microsoft accounts and tools delivered via a network of bogus websites and social media pages.

2023-12-14

Five Tips for Securing Your CI/CD Pipeline

Continuous Integration & Continuous Deployment: As software applications grow more complex, their security has become more challenging.

2023-12-14

Ukrainian Mobile Operator Suffers A Large-Scale Cyber Attack 

24 Million Users: Ukraine's largest mobile network, Kyivstar, suffered a massive cyber attack, knocking the service offline for an extended period.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

Center for Identity - University of Texas at Austin

Center for Identity - University of Texas at Austin

The mission of the Center is to deliver the highest-quality discoveries, applications, education, and outreach for excellence in identity management, privacy, and security.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

Tigera

Tigera

Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to meet their security and compliance requirements.

MassMutual Ventures

MassMutual Ventures

Mass Mutual ventures backs companies building category-defining businesses in markets including enterprise software, digital health, cybersecurity, and fintech.

Nu Quantum

Nu Quantum

Nu Quantum is developing quantum photonics hardware to power the quantum revolution in communications, sensing and computing.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.

NetBlocks

NetBlocks

NetBlocks is a global internet monitor working at the intersection of digital rights, cyber-security and internet governance.

Gen Digital

Gen Digital

At Gen™, our mission is to create technology solutions for people to take full advantage of the digital world, safely, privately, and confidently – so together, we can build a better tomorrow.

ThreatNG Security

ThreatNG Security

ThreatNG is redefining external attack surface management (EASM) and digital risk protection with a platform of unmatched breadth, depth, and capabilities in thwarting technical and business threats.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.

Crypto Legal

Crypto Legal

Crypto Legal is a leading UK-based law firm specialising in blockchain forensics and legal services.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.

Barquin Solutions

Barquin Solutions

Barquin Solutions is a full-service information technology consulting firm focused on supporting U.S. federal government agencies and their partners.

RapidFort

RapidFort

RapidFort’s Software Attack Surface Optimization Platform remediates 95% of software vulnerabilities in minutes without code changes.

St Fox

St Fox

St. Fox is a leading consultancy helping enterprises secure their Cloud, Data, endpoints, and applications.