BUSINESS > Services > IT & Telecoms


« Back to News

2022-05-18

Google’s New Security Features

Google is giving users much more control over personal privacy and the adverts they are served, as well as better security for online payments.

2022-05-10

Special Measures To Deal With Quantum Technology

The US wants to speed up the domestic development of quantum technology, whilst adddressing the risks it presents to secure communications.

2022-05-02

Three Vital Concerns For Companies Running Hybrid Cloud Environments

The threat of a data breach and data loss is a dangerous possibility for companies that run hybrid cloud environments. By Florian Malecki

2022-04-28

Cyber Criminals Increasingly Focus On Mobile Devices

Mobile platforms supply an ever increasing number of distributed endpoints and their security is no longer an option for businesses. By Ian Porteous.

2022-04-22

Identity & Authentication For Mobile Users

For mobile users, there is a clear gap in the level of trust between the level of expectations from consumers versus real experience. By Dario Betti

2022-04-20

Microsoft Removes Domains Used For Cyber Attacks On Ukraine

Fancy Bear: Microsoft has seized control of seven domains used by Russian threat actors for attacks that targeted digital access in Ukraine.

2022-04-11

Russia Hacked Ukrainian Satellite Communications

The Viasat KA band satellite was hit by a sophisticated cyber attack that wiped devices on the same day that Russia's invasion of Ukraine began.

2022-04-11

Mobile Cyber Attacks: The Different Facets Of Smartphone Malware

Vulnerable Banking Apps: Behavioural biometrics is the key to overcoming the challenge of advances in mobile malware. By Gemma Staite 

2022-03-02

The Online Battle In Ukraine

Ukraine's invasion is Europe's first experience of conflict in the digital age. Social media, the Internet & Telecoms networks have been weaponised.

2022-02-17

IT Technician Jailed For Revenge Attack After Being Fired

A British IT technician has been jailed for a revenge cyber attack on a school after being sacked for not disclosing a record of criminality.

2022-02-21

Apple Updates AirTag To Combat Stalkers

Apple will update the iPhone and AirTag software with a warning message that using AirTags to track people is a crime in many jurisdictions.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Irish Reporting & Information Security Service (IRISS)

Irish Reporting & Information Security Service (IRISS)

IRISS-CERT is Ireland's first CSIRT (Computer Security Incident Response Team) to provide services to all users within Ireland.

Conscio Technologies

Conscio Technologies

Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

ACI Worldwide

ACI Worldwide

ACI Worldwide powers electronic payments for more than 5,000 organizations around the world.

Network Integrity Systems

Network Integrity Systems

Network Integrity Systems is a leader in network infrastructure security and offers solutions specifically developed for Government and Private Enterprise.

HoxHunt

HoxHunt

HoxHunt is an automated cyber training program that transforms the way your employees react and respond to the growing amount of phishing emails.

Armorblox

Armorblox

Armorblox stops targeted email attacks such as 0-day credential phishing, payroll fraud, vendor fraud, and other threats that get past legacy security controls.

Jenson Knight

Jenson Knight

Jenson Knight is a global cyber security, cloud and IT infrastructure staffing specialist.

VS Security Products

VS Security Products

VS Security Products design, manufacture and sell the most extensive range of degaussers and data destroyers on the market, suitable for all types of magnetic media.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

Authenteq

Authenteq

Authenteq provides an Omni-Channel identity verification and KYC solution that allows your customers to verify their identity through any channel without compromising their privacy.

Cyber Smart Defense

Cyber Smart Defense

Cyber Smart Defense is a specialist provider of penetration testing services and IT security audits.

OnSecurity

OnSecurity

OnSecurity replaces the overhead of traditional penetration testing firms with a simple online interface, making it easy to book tests as and when needed.

Abacus Group

Abacus Group

Abacus Group is a global IT services firm for alternative investment firms, providing an enterprise technology platform specifically designed to meet the unique needs of financial services.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.