BUSINESS > Services > IT & Telecoms


« Back to News

2022-01-31

DDoS Attack Knocks Out Andorra's Internet

Incidents in Andorra & Belarus demonstrate the dangerous vulnerability of small states with unitary telecoms infrastructure to external attack. 

2022-01-17

Google Buys Siemplify For $500m

A Watershed Moment: Google has acquired Israeli threat detection firm Siemplify and wants to ‘change the rules’ of threat detection and response.

2022-01-12

SIM Swapping Attacks Caused T-Mobile Breach

T-Mobile Incident Report: SIM swapping makes it possible for attackers to take control of a target's mobile phone number.

2022-01-11

Kazakhstan Shuts Down The Internet

State Of Emergency: The Kazakhstan government switched off the Internet in response to violent protests, bringing the economy to a halt.

2021-12-22

Microsoft's New AI Debugging Tool

BugLab: Microsoft’s concept is to develop an AI that can automatically find and repair software bugs using a 'hide and seek' game as the model.

2021-12-21

Stealthy Malware Hiding Behind An Invalid Date

e-Commerce At Risk: A highly sophisticated malware targeting online stores, CronRAT is undetected by many antivirus engines.

2021-12-13

Critical Fault with Log4j Software

Alert: Attackers are exploiting a critical vulnerability in Apache Log4j, a logging library that's used in millions of Java-based applications.

2021-12-08

Amazon Cloud Outage Affects Major Customers

The extent to which major companies in retail, media, logistics, financial & other critical services rely on the outsourced cloud provider is exposed.

2021-12-02

What Is An API, Anyway?

AN API is the acronym for a software intermediary that allows two applications to talk to each other - which is is a very important security feature.

2021-11-30

Tesla Drivers Can’t Unlock Their Cars

Network Outage: Technology makes things convenient, but reliance on a server working all the time can be downright dangerous for Tesla drivers.

2021-11-29

Spyware - Apple Starts Legal Action Against NSO Group

The controversial and secretive NSO Group is accused of using its powerful spyware in a concerted attack on Apple's customers, products & servers.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

Latham & Watkins LLP

Latham & Watkins LLP

Latham & Watkins is an international law firm. Practice areas include Data Privacy, Security and Cybercrime.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

Quality Professionals (Q-Pros)

Quality Professionals (Q-Pros)

QPros are a recognized leader in providing full-cycle software quality assurance and application testing services.

Mantix4

Mantix4

Mantix4’s M4 Cyber Threat Hunting Platform actively defends against cyber threats.

National Digital Exploitation Centre (NDEC) - United Kingdom

National Digital Exploitation Centre (NDEC) - United Kingdom

NDEC is a project to create a centre of cyber and digital development and education for the UK. It will offer training in digital practices, cyber security and research.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

Transpere

Transpere

Transpere provides IT Asset Disposition (ITAD), Data Destruction, Electronic Recycling and Onsite Data Services.

oneM2M

oneM2M

oneM2M is a global organization creating a scalable and interoperable standard for communications of devices and services used in M2M applications and the Internet of Things.

Evanston Technology Partners (ETP)

Evanston Technology Partners (ETP)

ETP provides services and solutions to enable and transform businesses in the areas of cybersecurity, data protection, and efficient operations practices.

Bigbee Technology

Bigbee Technology

Bigbee Technology are an IT solutions company based in Dar es Salaam founded by a group of professionals from around the globe.

Innovex Global

Innovex Global

Innovex is a full-service executive search and advisory business that engages with early-stage startups, scale-ups, and established businesses in the Fintech, Cybersecurity and Technology industries.

Encova Insurance

Encova Insurance

Encova’s cyber liability coverage protects you and your customers in case of a security breach in your company's data.

SecOps Group

SecOps Group

SecOps Group is a boutique cybersecurity consultancy helping enterprises identify & eliminate security risks on a continuous basis.

Zorins Technologies

Zorins Technologies

Zorins Technologies is a leading IT company providing IT networking Equipment and expertise in managed services, consulting, and cybersecurity.

Obviam

Obviam

Obviam specialize in providing security solutions tailored to meet the unique needs of each of our clients, no matter where they are in their security journey.