BUSINESS > Services > IT & Telecoms


« Back to News

2024-12-06

Microsoft Faces £1bn Lawsuit For Cloud Licencing Damages

Restricting Competition: Many UK businesses could be in line to receive substantial compensation if the claim filed against Microsoft succeeds.

2024-11-26

The Problem With Generative AI - Leaky Data

Confidential computing allows data to be input into a Gen- AI model and the data to be securely processed without leaking. By Samuel Tourbot

2024-11-26

Taking The You Out Of USB

How Businesses Can Reduce Risk: USBs are a particular concern for air gapped networks where defence relies on segregation.  By Jon Fielding

2024-11-20

The Industries Facing The Biggest Cyber Threats

Understanding the sectors most frequently targeted by cybercriminals can offer insights into the breadth & nature of these threats. By John McLoughlin

2024-11-19

Undersea Communications Cables Cut

Internet cables between Germany and Finland, and Lithuania and Sweden suffered a sudden outage. The affected countries suspect sabotage.

2024-11-18

Managing API Sprawl: The Growing Risk Of Shadow APIs & How To Mitigate It

Improve your API governance posture and eliminate API security blind spots with a deeply integrated service catalogue. By Miko Bautista

2024-11-18

Virtual iPhones: A Game Changer For Mobile App Development Security

Digital Twin: Virtual iPhones that allow developers to test & tweak their apps without needing a physical device are a security game-changer.

2024-11-15

USB Attacks: The Threat Putting Critical Infrastructure At Risk

Insights into the challenges organisations face in securing removable media, along with practical advice for enhancing its security. By James Neilson

2024-11-14

Five Best Practices For Secure & Scalable Cloud Migration

Lift & Shift: Follow these five battle-tested best practices to ensure your cloud migration transforms capabilities, not create headaches. 

2024-11-08

Testing APIs Against The OWASP LLM Top 10

Insufficiant Testing: Several popular GenAI applications have been found to be exposed to indirect prompt injection vulnerabilities. By Andy Mills

2024-11-07

Cybercrime & Trade Secrets

Navigating New IP Threats In A Digital World: As the value of IP continues to grow, protecting trade secrets is a big issue. By Randy Sadler

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

Guardian360

Guardian360

The Guardian360 platform offers unrivalled insight into the security of your applications and IT infrastructure.

Axis Capital

Axis Capital

AXIS Insurance’s Professional Lines Division is a leading underwriter of technology/cyber coverage and other specialty products around the globe.

AGAT Software

AGAT Software

AGAT Software is an innovative security provider specializing in external access authentication and data protection solutions.

OpenText

OpenText

OpenText is a leader in Enterprise Information Management software and a portfolio of related solutions for Information Governance, Compliance, Information Security and Privacy.

Awake Security

Awake Security

Awake Security offer a security solution built on an AI platform that acts like the human brain to sense, detect, and respond to threats you may not even know exist.

Naoris Protocol

Naoris Protocol

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

Mitiga

Mitiga

Mitiga uniquily combines the top cybersecurity minds in Incident Readiness and Response with a cloud-based platform for cloud and hybrid environments.

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce has partnered with Purdue University and Carnegie Mellon University to create the Rolls-Royce Cybersecurity Technology Research Network.

ThrottleNet

ThrottleNet

ThrottleNet provides world-class managed IT services and cybersecurity to organizations in St. Louis and throughout Missouri.

Baselime

Baselime

Baselime, the cloud-native observability platform. Resolve issues in your cloud application before they become problems.

Tyto Athene

Tyto Athene

At Tyto Athene, we harness the power of technology to provide solutions that shape the future.

Black Belt Secure

Black Belt Secure

We provide critical cybersecurity services such as managed security, ransomware mitigation, penetration testing, system auditing and compliance services to your organization.

Datagroup

Datagroup

Datagroup makes IT easy. Our IT experts ensure that your technology is always up to date with perfectly customized solutions.

Cyberdise

Cyberdise

Cyberdise is an AI-driven cybersecurity awareness solution designed for companies with complex security requirements.