BUSINESS > Services > IT & Telecoms


« Back to News

2021-10-27

British Spies Trust Amazon With Their Secrets

Britain’s most secret data will be protected by a single US technology company, as GCHQ, MI5 & MI6 contract with AWS to host classified material.

2021-10-12

How To Use Transit Gateways To Monitor Traffic

Transit gateways are a way of managing traffic via different Virtual Private Clouds and AWS accounts, making them much easier to use. By Emily Henry

2021-10-13

Don't Click On Pop-Ups

Dark Patterns are website design methods intended to collect more information and extract more cash than users intend by exploiting cookies.

2021-10-11

Massive Twitch Data Breach

Amazon's game-streaming platform Twitch, with 30m daily visitors, has been hacked, losing confidential company and user data.

2021-10-05

Data Is Your Most Valuable Asset. How Are You Protecting Yours?

Backup: Keeping a copy of data is not sufficient, you need an effective system that can protect and support it, everywhere. By Colin Tankard

2021-09-22

North America VPN Market Will Soon Be Worth $70 Bn

Widespread use of mobile devices and the implementation of BYOD rules are driving the rapid development of the N. American VPN market.

2021-09-14

Apple's Emergency Patch For NSO Hack

Zero Click: Apple scrambles to fix a security vulnerability that allows hackers to directly infect iPhones and other devices without any user action.

2021-09-07

Apple Delays Scanning iPhones For Child Abuse

Plans for software capable of detecting child abuse images to be built into iPhones and iOS devices have been suspended over privacy concerns.

2021-09-01

Malware Attacks Target Linux-based Operating Systems

Linux operating systems are being targeted, with nearly 13m detections in 2021 H1, mostly in outdated systems running unpatched software.

2021-08-23

T-Mobile Customers Affected By Massive Breach

T-Mobile has admitted to a sophisticated attack and now the stolen personal data of as many as 54 million US customers could be up for sale.

2021-08-10

Endpoint Security Is More Important Than Ever

The big increase in home working makes endpoint security critically important to protect remote workers and IT professionals. By Eileen Harrison

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Mellanox Technologies

Mellanox Technologies

Mellanox Technologies is a leading supplier of end-to-end Ethernet and InfiniBand intelligent interconnect solutions and services for servers, storage, and hyper-converged infrastructure.

Netteam

Netteam

Netteam designs, implements and services networking solutions for companies of all sizes.

Remediant

Remediant

Remediant is the leader in Precision Privileged Access Management. We protect organizations from ransomware and data theft via stolen credentials and lateral movement.

Swimlane

Swimlane

Swimlane is a leader in security automation and orchestration (SAO). Our platform empowers organizations to manage, respond and neutralize cyber threats with adaptability, efficiency and speed.

Dark Cubed

Dark Cubed

Dark Cubed is an easy-to-use cyber security software as a service (SaaS) platform that deploys instantly and delivers enterprise-grade threat identification and protection at a fraction of the cost.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

Cyber Intelligence 4U

Cyber Intelligence 4U

Cyber Intelligence 4U is an educational services company that provides two levels of cybersecurity training programs: executive and technical.

Quside

Quside

Quside, a spin-off from The Institute of Photonic Sciences in Barcelona, designs and manufactures innovative quantum technologies for a wide range of applications including cyber security.

Securosys

Securosys

Securosys is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmission

LocateRisk

LocateRisk

LocateRisk provides more efficiency, transparency and comparability in IT security with automated, KPI-based IT risk analyses.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Epoch Concepts

Epoch Concepts

Offering a full line of IT services, solutions, and integration capabilities, Epoch Concepts is the trusted partner of the US military, federal agencies, private enterprises, and systems integrators.

Ryan Financial Lines

Ryan Financial Lines

Ryan Financial Lines Cyber provides risk transfer solutions for complex cyber and technology exposures, globally.

Consortium

Consortium

Consortium goes beyond products and promises by working with enterprises to identify, acquire, and deploy cybersecurity solutions that matter.

ManagedMethods

ManagedMethods

ManagedMethods is a leading Google Workspace and Microsoft 365 data security and student safety platform for K-12 schools.