BUSINESS > Services > IT & Telecoms


« Back to News

2023-05-17

5G Renders Smart Cities More Vulnerable To Attacks

Smart Cities offer benefits like better efficiency and data-driven decision-making, but they may expose critical infrastructure and health & safety.

2023-05-09

Malware Disguised As Legitimate Android Apps

Fluhorse: Malicious apps designed to extract sensitive information, including user credentials and Two-Factor Authentication codes.

2023-05-03

Is ISO 27001 Worth It?

The Only Auditable International Standard For Information Security: What are the relative pros & cons of ISO 27001 - is it worth it? By Phil Robinson

2023-05-03

Why Zero Trust Is Fundamental In Today’s Economic Climate

Harnessing affordable zero trust architecture based solutions is preferable to investing in multiple expensive solutions. By Dominik Birgelen

2023-04-24

Israeli Hacking Spyware In Widespread Use

New Israeli-made spyware resembling NSO Group's notorious Pegasus malware has been used to target journalists & politicians in many countries.

2023-04-21

EU Payroll & HR Services Giant Under Attack

The payroll services firm SD Worx has shut down IT systems and told its customers that its UK & Ireland division has suffered a cyber attack.

2023-04-13

What The West's Caution Over Chinese Tech Really Means

The focus on China as a malicious security threat is somewhat of a distraction. The real battle is in military and economic power. By Dario Betti

2023-04-12

Immutable Storage Is The One Solution That Will Keep Your Data Safe

Immutable data storage ensures data security and integrity in multi-cloud and hybrid-cloud environments in several ways. By Florian Malecki

2023-04-12

How Does IT Impact The Manufacturing Industry? All You Need To Know

IT tools like firewalls, intrusion detection systems & encryption technologies are essential to secure manufacturing operations from cyber threats.

2023-04-14

Japan’s Leading Companies Exposed To Ransomware

An attack on the Japanese IT company Fujitsu could cause a surge in ransom attacks by criminal hackers on companies & their customers.

2023-03-29

What Is Email Spoofing & How to Protect Your Organization

Fraud: There are several measures that organizations can take to protect themselves against email spoofing. By Gilad David Mayaan.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

IABG

IABG

IABG offer independent, product-neutral consulting as well as technical and scientific services for the use of safety-relevant systems and technologies.

Exonar

Exonar

We enable organisations to better organise their information, removing risk and making it more productive and secure.

Zerocopter

Zerocopter

Zerocopter enables you to confidently leverage the skills of the world's most knowledgable ethical hackers to secure your applications.

TorGuard

TorGuard

TorGuard is a Virtual Private Network services provider offering secure encrypted access to the internet.

Slovenska Akreditacija (SA)

Slovenska Akreditacija (SA)

Slovenska Akreditacija (Slovenia Accreditation) is the national standards accreditation body for Slovenia.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

Thomsen Trampedach

Thomsen Trampedach

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

Keyavi Data

Keyavi Data

With Keyavi’s evolutionary data protection technology, your data stays within the bounds of your control in perpetuity.

Suresecure

Suresecure

Suresecure are a specialised consulting company providing Strategic IT security consulting, Managed Security Services, and Incident Response Management.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV) is a 6000+ members angel investing firm which supports new-age entrepreneurs by connecting them with a diverse group of investors.

Togggle

Togggle

Togggle offers seamless identity verification solutions and distributed infrastructure, enabling organizations to combat fraud and ensure compliance with data protection regulations.

Bearer

Bearer

Bearer helps modern teams ship trustworthy products with the help of our code security solution built for security, privacy and engineering teams.

Boston Government Services (BGS)

Boston Government Services (BGS)

Boston Government Services is an engineering, technology, and security firm providing mission-focused solutions for the clean energy, nuclear, and federal programs markets.

ZENDATA

ZENDATA

ZENDATA are an innovative provider of intelligent, tailored cybersecurity solutions to global companies and public sector institutions.