BUSINESS > Services > IT & Telecoms


« Back to News

2022-12-05

Ericsson Invests In 6G Network Research

Merge The Digital & Physical World: Network equipment maker Ericsson will be investing heavily into 6G mobile connectivity research in Britain.

2022-11-28

Hidden In Plain Sight

Control system cyber incidents are more numerous & damaging than you might expect - more than 17 million resulting in 34,000 deaths. By Joe Weiss

2022-11-25

Five Ways Executives Can Optimize Cyber Security Spending

The Right Tools & People: Just pouring money into cyber security does not automatically result in increased preparedness. By Lee Rossey

2022-11-25

Shifting Left In Enterprise Cloud Security

Speed Versus Safety: Companies need to invest in preventative measures to safeguard their cloud estates against cyber attacks. By Stuart Green

2022-11-26

Outsourcing IT Systems & Data Management Can Be A False Economy

Risky Business: In the connected world organisations increasingly rely on outside providers to fulfill their cyber and IT supply chain needs.

2022-12-06

Smartphones Are More Vulnerable Than You Think

Ghost Touch: Most mobile phone users of all ages have a smartphone, although few are aware quite how vulnerable these devices are to attacks.

2022-11-29

Phishing- As-A-Service

'Robin Banks' Returns: A notorious phishing-as-a-service platform has relocated its infrastructure to a criminal platform located in Russia.

2022-11-16

The Role of Zero Trust Architecture In Minimising Cyber Risks

The ZTA model creates a far more secure environment that protects against unauthorized access to sensitive data. By Dominik Birgelen

2022-11-15

Guilty: A Criminal Conviction For One CISO Has Consequence For Others

Doing The Right Thing: Uber’s ex-security chief has been found guilty in a US court - what does that mean for CISOs in the UK? By Nigel Jones

2022-11-22

Russia Prepares To Disconnect From The World Wide Web

Unplugged: The Russian government has been working on ways to monitor Russian citizens' Internet activities & block information from abroad. 

2022-11-21

Black Women Comprise Less Than 1% Of The IT Workforce

Racist & Sexist?: Black women, and women in general, working in tech are often where they are despite the lack of inclusive working culture.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

Raz-Lee Security

Raz-Lee Security

Raz-Lee Security is the leading security solution provider for IBM Power i, otherwise known as iSeries or AS/400 servers.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

Custodio Technologies

Custodio Technologies

Custodio Technologies was established as a Singaporean R&D Centre of Israel Aerospace Industries (IAI) in order to spearhead R&D activities in the field of cyber early warning.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

N8 Identity

N8 Identity

N8 Identity helps organizations realize the vision of Autonomous Identity Governance™ with AI-driven Identity solutions.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

Bytes Technology Group

Bytes Technology Group

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

O'Reilly Media

O'Reilly Media

O’Reilly’s help professionals learn best practices and discover emerging trends that will shape the future of the tech industry.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).

eMudhra

eMudhra

eMudhra is a leader in Identity and Transaction Management Solutions.

c0c0n

c0c0n

c0c0n is the longest running conferences in the area of Information Security and Hacking, in India.

Oxylabs

Oxylabs

Oxylabs is the largest datacenter proxy pool in the market, with over 2 million proxies. Designed for high-traffic, fast web data gathering while ensuring superior performance.

DataGuard

DataGuard

DataGuard is a security and compliance software company trusted by organisations across the globe.

Cyberr

Cyberr

We’re transforming cybersecurity recruitment with Cyberr Intelligence – the AI-driven platform that connects top cybersecurity talent, both freelance and permanent, with leading employers worldwide.