BUSINESS > Services > IT & Telecoms


« Back to News

2023-12-27

The Next Generation Of Cloud Security

Cloud-Native Application Protection Platform: A package of security tools that helps safeguard your data & applications in the cloud.

2023-12-19

Microsoft Takes Action To Stop Sales Of Fake Accounts

Cybercrime As A Service: Millions of fake Microsoft accounts and tools delivered via a network of bogus websites and social media pages.

2023-12-14

Five Tips for Securing Your CI/CD Pipeline

Continuous Integration & Continuous Deployment: As software applications grow more complex, their security has become more challenging.

2023-12-14

Ukrainian Mobile Operator Suffers A Large-Scale Cyber Attack 

24 Million Users: Ukraine's largest mobile network, Kyivstar, suffered a massive cyber attack, knocking the service offline for an extended period.

2023-12-04

Trouble At Three

Thousands of Three mobile customers in the UK say they could not get signal on their phones over the weekend and the problem is persisting.

2023-11-29

Supply Chain Attack On British Law Firms

Specialist Managed Service Provider Outage: As many as 200 firms were left unable to access phone calls, emails, or case management systems.

2023-11-27

Creating A Top-Notch Financial App With Advanced Cybersecurity

The Ultimate Guide: What is the current role of cybersecurity in FinTech and what standards are better to opt for? By Serge Khmelovskyi

2023-11-27

Securing National Communications Infrastructure

Digital Connections: Network disaggregation is vital to protecting critical telecoms infrastructure against external threats. By Richard Brandon

2023-11-17

Four Reasons To Use A Dedicated IP In 2023

Elevate Online Security With A Dedicated IP: Better email deliverability, a lower chance of getting blacklisted & it’s essential for remote workers.

2023-11-01

Is OAuth Authentication Secure?

Open Authorization Mitigation Strategies: A powerful tool for modern web security that needs to be used properly to reach its full potential.

2023-10-31

Defenders Of The Cybersecurity Command Centre  

The SecOps Team: Serving as the frontline by protecting the digital fortress from the myriad of tools available to threat actors. By Fabien Rech

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Paraben

Paraben

Paraben provides digital forensics solutions for mobile devices, smartphones, email, hard drives, and gaming system.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

Cybertron

Cybertron

Cybertron services include real-time monitoring and incident response and a cyber range for competency development.

Cloudentity

Cloudentity

Cloudentity combines Identity for all things with API and Application security in a unique deployment model, combining cloud-transformation and legacy systems.

Trustelem

Trustelem

Trustelem offers European and global companies a ready-to-use access management service that respects the principles of sovereignty, territoriality and privacy.

bluedog Security Monitoring

bluedog Security Monitoring

Sentinel from bluedog provides powerful and affordable internal network monitoring.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

Enet 1 Group1

Enet 1 Group1

Enet 1 Group audits, assesses, recommends, and delivers tested solutions for the ever-increasing threats to your critical systems and digital assets

Nominet

Nominet

Nominet's cyber division offers network detection and response services to governments and enterprises worldwide.

ThreatReady Resources

ThreatReady Resources

ThreatReady reduces an organization’s risk by delivering cyber security awareness training based on the latest, state-of-the-art learning science to effectively drive long-term cyber-safe behavior.

LibraSoft

LibraSoft

Librasoft creates solutions to protect information from external and internal threats.

Netography

Netography

Netography provides a scalable and reliable platform for detection & remediation of cyber threats found on your network.

Gray Analytics

Gray Analytics

Gray Analytics is a Cybersecurity Risk Management company providing best-practice services across a broad spectrum of cyber scenarios for both government and commercial customers.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

Tryaq

Tryaq

Tryaq are a group of cybersecurity experts and enthusiasts who share the mission to make the world feel safer online.

Resmo

Resmo

Resmo is an all in one platform for SaaS app and access management for modern IT teams.