BUSINESS > Services > IT & Telecoms


« Back to News

2023-08-01

Who Practices Digital Safety Better, Mac Or Windows Users?

Microsoft Vs. Apple: Despite ever-evolving changes in the cyber security landscape, many people still hold outdated ideas about digital safety.

2023-07-24

The Security Challenge: Mapping & Securing Your Distributed Data

Why mapping your distributed data is necessary, what challenges you’ll face along the way, and how you can overcome them. By Dotan Nahum

2023-07-20

Sweden Issues An Order 'Stop Using Google Analytics'

Four Companies Fined; Customers' personal data was supplied to Google Analytics in a way that failed to meet EU technical security standards.

2023-07-08

The Netherlands To Restrict Computer Chip Equipment Exports To China

The Dutch will limit exports of some semiconductor manufacturing equipment, following US pressure to cut China's access to chipmaking tools. 

2023-07-03

How To Back Up GitLab To Prevent Data Loss 

GitLab Backup Methods: Streamlining backup processes, ensure data reliability & let DevOps focus on their core development tasks.

2023-06-27

Innovation In Cyber Security: NDR Meets XDR

Network Detection and Response and Extended Detection and Response have a synergy that leads to stronger cyber defenses.

2023-08-08

Only Half Of Citizens Are Happy With Digital Public Services

People are used to the convenience of e-commerce interactions and expect the same service levels in their interactions with government.

2023-06-22

Progress Software Has Critical Hacking Vulnerabilities

MOVEit: CISA has identified that another software product has been exploited to breach multiple US federal agencies by “unattributed APT actors”.

2023-06-14

Nine Types of Modern Network Security Solutions

Multiple Technologies & Policies: As reliance on digital technology & data intensifies, guaranteeing effective network security is imperative.

2023-06-19

Penetration Testing Is A Vital Tool To Deal With AI-Based Attacks 

Penetration testing can indicate the best ways to defend, remediate & recover from the threat of AI-inspired and AI-powered attacks. By Ed Skoudis

2023-06-19

Mobile Authentication: The Good, The Bad & The Ugly

Mobile authentication is convenient to use and offers a sense of security, but this type of device isn’t as secure as it may seem. By Mark Bell

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authenware

Authenware

AuthenWare delivers the highest level of identity security based on behavioral biometrics.

Redicom

Redicom

Redicom is an independent consulting agency focusing on identity management, strong authentication and single-sign-on.

vdiscovery

vdiscovery

vdiscovery is a provider of proprietary and best-in-breed solutions in computer forensics, document review, and electronic discovery.

Centro de Gestion de Incidentes Informaticos (CGII) - Bolivia

Centro de Gestion de Incidentes Informaticos (CGII) - Bolivia

CGII is the Computer Incident Management Center of the State of Bolivia.

Marcus Donald People

Marcus Donald People

Marcus Donald People is a UK IT recruitment specialist covering the following sectors: Infrastructure & Cloud, Information Security, Development, Business transformation.

Level Effect

Level Effect

Level Effect is developing new capabilities to bring a unique perspective on proactive network defense and advanced security analytics.

IT Jobs Watch

IT Jobs Watch

IT Jobs Watch provides a concise and accurate map of the prevailing IT job market conditions in the UK.

White Bullet

White Bullet

White Bullet’s risk profiling AI detects, dynamically scores and flags unsafe domains, apps and advertising.

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

MTS-ISAC promotes and facilitates maritime cybersecurity information sharing, awareness, training, and collaboration efforts between private and public sector stakeholders.

ST Engineering Antycip

ST Engineering Antycip

ST Engineering Antycip (formerly Antycip Simulation) is Europe’s leading provider of professional grade COTS simulation software, projection & display systems, and related engineering services.

National Cryptologic Foundation (NCF) - USA

National Cryptologic Foundation (NCF) - USA

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

Logically.ai

Logically.ai

Logically combines artificial intelligence with expert analysts to tackle harmful and manipulative content at speed and scale.

MedSec

MedSec

MedSec is the only company of its type focused solely on cybersecurity for hospitals and medical device manufacturers, offering both a cybersecurity software solution and consulting services.

AmiViz

AmiViz

AmiViz is the first B2B enterprise marketplace focussed on Cybersecurity business in the Middle East and Africa, designed specially to serve the interests of enterprise resellers and vendors.

Infodot Technologies

Infodot Technologies

Infodot Technologies specialize in a co-managed IT support and services approach, where businesses share their IT responsibilities with a skilled Managed IT Services Provider (MSP).