BUSINESS > Services > IT & Telecoms


« Back to News

2023-10-31

Defenders Of The Cybersecurity Command Centre  

The SecOps Team: Serving as the frontline by protecting the digital fortress from the myriad of tools available to threat actors. By Fabien Rech

2023-10-24

The Latest Trends In Email Threats

Callback Phishing & Malware Delivered Via Google Drive: Email threats remain one of the major sources of trouble for cybersecurity teams.

2023-10-23

ZTNA Is The Foundation Of Great VDI Deployments

Virtual DeskTop Infrastructure: Ensuring security in hosted desktop architectures can be a challenge. Zero Trust is the solution. By Karen Gondoly

2023-10-17

SIM Swapping Cyber Crime 

SIM card duplication is a specialised form of fraud, enabling identity theft, impersonation and other crimes, with serious consequences for victims.

2023-10-06

Safeguarding Businesses From Security Challenges In Advertising

Navigating The Pitfalls Of Google’s AI Data Privacy: Giving up control over ad placement is convenient, but carries several risks. By Mathew Ratty

2023-10-06

Top Five Cloud Penetration Testing Tools

Cloud penetration testing is focused exclusively on cloud infrastructure. What are the current best tools & methodology? By Vidushi Dubey

2023-10-06

Cyber Criminals Exploit Legitimate Software

Remcos & GuLoader: Research has found malicious trojans packaged with legitimate software widley available from criminally complicit vendors.

2023-09-26

Severe Risks From Remote Access Exposure

Response Time: Organisations are finding it difficult to manage their attack surfaces at a speed & scale necessary to combat threat actor automation.

2023-09-20

The Worst Places To Connect To Public Wi-Fi

If your employees use public Wi-Fi networks, there is a high chance of malware infection. How can you protect both your people and your business?

2023-09-11

Elon Musk Withheld Starlink Over Crimea

Electric Cars, Space Exploration, Neurotechnology & Social Media Are Not Enough: Elon Musk decides to intervene in geopolitics.

2023-09-14

CISA's Post-Quantum Cryptography Initiative

As quantum computing advances, it presents an increasing risk to widely used encryption methods. A new technology standard is needed.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Spiceworks

Spiceworks

Spiceworks provide a range of free apps for IT professionals including network inventory, network monitor, and help desk.

Assuria

Assuria

Assuria Cyber Security solutions provide protective monitoring of systems and user activity across the whole IT infrastructure.

IntelliGO Networks

IntelliGO Networks

IntelliGO Networks is a cybersecurity company focused on Managed Detection and Response (MDR).

Thermo Systems

Thermo Systems

Thermo Systems is a design-build control systems engineering and construction firm. Capabilties include industrial control system cybersecurity.

CyberCrowd

CyberCrowd

CyberCrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

CybX Security LLC

CybX Security LLC

CybX is the first company of its kind to merge the practice of computer forensics with computer security and information security.

MicroSec

MicroSec

MicroSec is a company specializing in IoT security. We focus on bringing enterprise grade security to IoT and embedded systems.

Velta Technology

Velta Technology

Velta Technology provide digital safety and cybersecurity solutions for the industrial space.

CYMAR

CYMAR

CYMAR The “CYBER” Smart Solution to offer sustainability and bring resilience to Global SMART Terminals and protect the supply chain of the World’s economy.

Tidelift

Tidelift

Tidelift provides the tools, data, and strategies that help organizations assess risk and improve the health, security, and resilience of the open source used in their applications.

Dapple Security

Dapple Security

Dapple Security is creating cutting edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform.

Dedagroup (Deda)

Dedagroup (Deda)

Dedagroup provide application solutions and IT services to bring innovation at the core of business processes.

Advanced IT

Advanced IT

Reliable managed IT Security & support services that will help you take your business operations to the next level without breaking the bank!

Auria

Auria

Auria advances complex space, missile, and cyber operations with visionary solutions and software.

Scinary Cybersecurity

Scinary Cybersecurity

Scinary was founded in 2015 on the premise that cybersecurity should not be limited to just large corporations or large government entities.

Securitum

Securitum

Securitum is a leading penetration testing company in central and eastern Europe.