BUSINESS > Services > IT & Telecoms


« Back to News

2025-02-11

AI-Based Phishing Attacks Demand A Multi-Pronged Response

New Techniques Demand A Zero Trust Mindset: A new strategy for combating AI-powered phishing attacks is needed. By Oliver Paterson

2025-02-10

Apple Ordered To Give Access To Users' Encrypted Data

Investigatory Powers: British law enforcement have demanded access to encrypted data stored by Apple users in its global cloud service.

2025-02-06

File Transfers Can Be The Weakest Link

File transfers need to be easy, quick and most of all, safe. But that requires more than just a traditional email gateway solution. By Richard Bourne

2025-02-03

US Nationals Indicted For Fraudulent Remote IT Work

The FBI has uncovered a plot to install North Korean IT workers as remote employees to generate revenue for North Korea and evade sanctions.

2025-01-20

Data Broker Discloses A Major Breach Of App User Data

Misappropriated Access Key: Hacked data appears to have originated in thousands of smartphone apps, including Tinder, Grindr and Candy Crush.

2025-01-18

Thermodynamic Computing - A New Computer Architecture

A Third Way: Thermodynamic Computing aims to make use of the inherent noise and fluctuations of matter to power advanced computations. 

2025-01-15

Understanding The Importance of Kernel-Level Security

Is Your ICS Kernel Vulnerable?: The kernel is at the core of any industrial operating system - protecting its security is essential. By Tim Reilly

2025-01-11

CISA Finds Serious Problems In Oracle & Mitel Systems

Known Exploited Vulnerabilities: Thousands of network servers found to be exposed to unauthorised admin access and data extraction.

2025-01-06

Apple Will Pay $95m Penalty For Misusing Siri

Apple will have pay $95m to settle a case which claimed that its Siri virtual assistant was listening in to Apple users without their permission.

2025-01-03

Hackers Deploy Malicious Chrome Extensions

Supply Chain Attack: A large-scale hacking campaign targeting Chrome extensions has affected customers of a leading cyber security firm.

2024-12-27

IoT Devices Infected With Pre-Installed Malware

BadBox: Android malware embedded in the device’s firmware, which enables interception of private credentials & can install other malicious software.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Radisys

Radisys

Radisys offers software, products, integrated systems, and professional services for communication service providers and telecom solution vendors.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

Titania

Titania

Titania provide network security and compliance software. Find your Network Security gaps before hackers do with our security & compliance tools.

Cofense

Cofense

Cofense (formerly PhishMe) is a leading provider of human-driven phishing defense solutions.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TOAE Security

TOAE Security

TOAE Security is a trusted cyber security consulting partner helping today's leading organizations protect their most important assets from evolving cyber threats.

Bio-Morphis

Bio-Morphis

Bio-Morphis Reflex solution is a paradigm shift in the approach to information systems security.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

Celera Networks

Celera Networks

Celera Networks is a managed services provider specializing in cybersecurity, cloud and managed IT services.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

Otava

Otava

Otava is a global leader of secure, compliant hybrid cloud and IT solutions for service providers, channel partners and enterprise clients.

Integris

Integris

Integris offers best-in-class services like dedicated vCIOs, specialized security and compliance advisory services, a 24/7 help desk, and more.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

Sentar

Sentar

Sentar is a cyber intelligence company, applying advanced analytics and systems engineering expertise to protect our national security by securing mission-critical assets.

BJSS

BJSS

BJSS is an award-winning technology and engineering consultancy for business.

SecAI

SecAI

SecAI is an innovative threat intelligence-driven, and AI-powered vendor aiming at cyber threat detection and response.