BUSINESS > Services > IT & Telecoms


« Back to News

2023-04-14

Japan’s Leading Companies Exposed To Ransomware

An attack on the Japanese IT company Fujitsu could cause a surge in ransom attacks by criminal hackers on companies & their customers.

2023-03-29

What Is Email Spoofing & How to Protect Your Organization

Fraud: There are several measures that organizations can take to protect themselves against email spoofing. By Gilad David Mayaan.

2023-02-20

Is Your Business Compliant With Data Sovereignty Requirements?

It is increasingly important for organisations to understand where their cloud data is stored and who holds the keys to that data. By Florian Malecki

2023-02-18

Making A Success Of Hybrid Working

Companies need to address five key issues holding them back and ensure employees engage with collaboration tools now. By Rob Quickenden

2023-02-13

Quantum Computer Power Threatens Encryption

Quantum computers will completely transform data processing speeds and they can also be used by enemies for highly destructive modes of attack.

2023-02-08

Creating Order Out Of WAF Management Chaos

Web Application Firewall Management: How WAF rules are run & processed can provide security without sacrificing performance. By Paul McNamara

2023-01-30

Turla Hackers Deliver Andomeda Malware 

Andromeda is typically deployed by hackers using an infected USB drive and is most frequently used for malware delivery and credentials theft.

2023-01-30

Microsoft To Invest $10b In OpenAI 

Generative Artificial Intelligence: Microsoft is planning to make a massive startup investment in the company behind ChatGPT and DALL·E.

2023-01-24

Cloud-Based Security Solutions Are On The Up

There are significant financial & functional advantages which are driving investment in cloud-based security solutions in 2023. By Vivek Daga

2023-01-21

T-Mobile Hacker Exposes 37m Customers' Personal Data

Unfortunately Not Immune: T-Mobile has disclosed seven major breaches since 2018 and the latest event may be one of the biggest of all time.

2023-01-22

The Advantages Of Using A VPN 

VPNs are not the silver bullet to make you invincible on the Internet, but they’re a helpful addition to security & privacy. By Milos Djordjevic

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Veracity Industrial Networks

Veracity Industrial Networks

Veracity provides an innovative industrial network platform that improves the reliability, efficiency, and security of industrial networks and devices.

ReliaQuest

ReliaQuest

ReliaQuest’s GreyMatter solution connects existing technology, people, and process – then equips security teams with unified, actionable insights across their entire environment.

Glilot Capital Partners

Glilot Capital Partners

Glilot Capital Partners is an Israeli seed and early-stage VC. We specialize in businesses which disrupt enterprise technology, mainly in the fields of AI, big data and cybersecurity.

Elysium Analytics

Elysium Analytics

Elysium Cognitive Security Analytics delivers the latest and most flexible security system to reduce cost and complexity while providing unmatched scalability.

Mindsight

Mindsight

Mindsight is a technology consulting firm with expertise from cybersecurity to cloud, disaster recovery to infrastructure, and collaboration to contact center.

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

MTS-ISAC promotes and facilitates maritime cybersecurity information sharing, awareness, training, and collaboration efforts between private and public sector stakeholders.

LogicalTrust

LogicalTrust

LogicalTrust security testing specialists find the weakest points in your company and show you how to fix them step-by-step, as well as how to improve your security.

Cybertronium

Cybertronium

Cybertronium is a leader in managing cyber risk. We bring you the latest from the complex, ever-evolving online threat environment with the insights to inspire and the expertise to act.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Identity Digital

Identity Digital

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

AUCloud

AUCloud

AUCloud is a leading Australian cyber security and secure cloud provider, specialising in supporting businesses and Governments with the latest cloud infrastructure.

CirrusHQ

CirrusHQ

CirrusHQ are a Specialist AWS Advanced Consulting Partner with a focus on Cloud Management, DevOps, Migration and Consulting Services for the private and public sectors.

Identifly

Identifly

Identifly is the leading Australian independent identity consultancy and partner in Australia, helping enterprises implement large scale identity security projects fast.

Repello AI

Repello AI

Repello - making AI safe to trust. We help you continuously red-team your GenAI applications against ever-evolving AI threat landscape.

Sourcepoint

Sourcepoint

Sourcepoint offers enterprise-grade privacy automation for complex, dynamic compliance challenges.