BUSINESS > Services > IT & Telecoms


« Back to News

2023-01-19

Building An Identity-First Security Strategy

Going Beyond The NIS2 Directive: Effectively protecting identities, both human and machine, is a top priority for enterprises. By Tim Callan

2023-01-10

Zero Trust In (remote) Access

Caution Is Better Than Indulgence: Zero trust offers small companies a level of security equivalent to that of large enterprises. By Paddy Srinivasan

2023-01-09

Spying On Mobile Phone Calls

EarSpy: Smartphone manufacturers’ efforts to improve audio in their devices has led to new vulnerabilities, including unprotected earspeakers.

2023-01-03

Security Risks In 5G Mobile

Insecure By Design: 5G network slicing offers a widespread threat that includes potential weak points in policy, standards & supply chains.

2022-12-30

IT Downtime Is Growing As Digital Transformation Speeds Up

Visibility Is Key: Creating observability across the entire IT infrastructure allows organisations to mitigate the risk of downtime. By Matt Tuson

2022-12-30

Critical Infrastructure: A Flashing Beacon For Cybercrime

Cybercriminals are fully aware of the impact of disruption on vital services, not just financially, but on public confidence. By Deryck Mitchelson

2022-12-22

Guardian Newspaper Suffers A Large Scale Ransomware Attack

IT Systems Hacked: Guardian newspaper employees have been told to work from home following a serious incident affecting network connectivity.

2022-12-22

What Security Issues Do 5G Network Providers Need To Address?

5G is a more complex network technology than 4G and other cellular technologies, and its complexity can be a security problem. By Charlie Svensson

2022-12-13

Misconfigured Cloud Applications Are Putting Your Data At Risk

Shared Responsibility: When it comes to cloud applications, there’s no such thing as “security that is 100% handled by the vendor.” By Manuel Sanchez

2022-12-06

Password Manager LastPass Gets Hacked

The leading password management firm, whose software is used by 33 million users, has disclosed it has been breached twice this year.

2022-12-05

Fake Instagram Message Attacks Breach Email Security

A sophisticated phishing campaign impersonating Instagram to steal credentials successfully bypassed Microsoft 365 and Exchange security.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

City Security Magazine

City Security Magazine

City Security magazine helps promote best security practices and keep businesses informed on a wide variety of security-related issues.

Verisec International

Verisec International

Verisec International AB is a Swedish Tech company focused since inception in enabling Trust in Digital Transactions, through the development of proprietary cutting-edge technologies and services.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Meiya Pico Information Co

Meiya Pico Information Co

Meiya Pico is the leading digital forensics and information security products and service provider in China.

Abusix

Abusix

Abusix specializes in Internet security, network abuse handling, antispam and fraud prevention.

Digital Transformation EXPO (DTX)

Digital Transformation EXPO (DTX)

Digital Transformation EXPO showcases the latest technology and insight from the world’s leading brands and experts in DX.

Pixalate

Pixalate

Pixalate is an omni-channel fraud intelligence company that works with brands and platforms to prevent invalid traffic and improve ad inventory quality.

ShieldIOT

ShieldIOT

ShieldIOT delivers a complete AI-powered security solution across any IoT device, application and network.

Keynetic Technologies

Keynetic Technologies

Keynetic focuses on developing cybersecurity solutions for Industry 4.0.

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory is a manufacturer of military security and data destruction equipment for sensitive, classified, and secret information.

Practical Assurance

Practical Assurance

Practical Assurance helps companies navigate the rough terrain of information security compliance.

Zercurity

Zercurity

Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats.

SDG Corp

SDG Corp

SDG is a global cybersecurity, identity governance, risk consulting and advisory firm, addressing complex security, compliance and technology needs.

In Fidem

In Fidem

In Fidem specializes in information security management, with a bold approach that views cybersecurity as a springboard to organizational transformation rather than a barrier to innovation.

NSR

NSR

NSR provide trusted solutions that deliver positive business outcomes for our clients in cybersecurity and data protection challenges.

Dazz

Dazz

Dazz is the cloud security remediation platform for smart security and development teams.