BUSINESS > Services > IT & Telecoms


« Back to News

2017-06-09

How To Integrate Threat Intelligence

In a complicated, fast-paced cyber environment, it's difficult to hunt for vulnerabilities. Automating threat intelligence can help you find them.

2017-06-07

WannaCry Was Not A Phishing Attack

Researchers at Malwarebytes say the WannaCry ransomware threat didn’t begin with malware-infected phishing emails, as first suspected.

2017-06-06

Russian Cyber Gang Arrested By …. Russia

Russian Interior Ministry arrests major cyber criminal gang that infected over 1m Android smartphones with the CronBot Trojan.

2017-06-06

Fake Microsoft Tech-Support Using WannaCry

Action Fraud reports Tech-Support scammers claiming to be from Microsoft taking advantage of the global WannaCry ransomware attack.

2017-06-07

Instagram Launches Story Search

Social Media Contest: Instagram and Snapchat are fighting to get you to watch more than just your friends’ content.

2017-06-06

Protect Yourself Against Ransomware

Ransomware has been endemic for years. What can businesses and individuals do to protect themselves from malicious software?

2017-06-05

The Internet of Things Will Be Even More Vulnerable to Cyber Attacks

As more smart devices become connected, the world will become more exposed to attacks like the one that hit UK’s NHS. Opinion By Hannah Bryce

2017-06-01

Microsoft Buys Cybersecurity Firm

Hexadite provides technology to automate responses to cyberattacks that it says increases productivity and reduces costs for businesses.

2017-06-02

Ignoring Software Updates…

Failing to update leaves your devices vulnerable to attack. Configuring automatic updates from trusted providers makes sure these are installed regularly.

2017-06-02

WannaCry Outbreak Is Just A Tip Of An Iceberg

While WannaCry mostly hit business and government systems, the next targets could be private homes.

2017-05-30

Eight Steps For Cloud Security

Migrating corporate data to the cloud is really just a form outsourcing and testing the service provider's security means asking some hard questions.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

AV Test

AV Test

The AV-TEST Institute is a leading international and independent service provider in the fields of anti-virus research and IT security.

European Digital Media Association (EDiMA)

European Digital Media Association (EDiMA)

EDiMA, is the European trade association representing online platforms. It is an alliance of new media and Internet companies.

CSA Events

CSA Events

Cloud Security Alliance conducts a series of conferences around the world. This listing provides a link to details of upcoming events.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

SolutionsPT

SolutionsPT

SolutionsPT enables customers to strengthen their Operational Technology (OT) network to meet the ever increasing demand for performance, availability, connectivity and security.

AllegisCyber Capital

AllegisCyber Capital

AllegisCyber is an investment company with a focus on seed and early stage investing in cybersecurity and its applications in emerging technology markets.

Kobil Systems

Kobil Systems

Kobil is a pioneer in the fields of smart card, one-time password, authentication and cryptography.

authUSB

authUSB

authUSB Safe Door is a tool that provides secure access to the content of USB devices that circulate in organizations.

Osirium

Osirium

The Osirium PxM Privileged Access Management platform addresses both security and compliance requirements by defining who gets access to what and when.

Digi International

Digi International

Digi is a leading global provider of mission-critical and business-critical machine-to-machine (M2M) and Internet of Things (IoT) connectivity products and services.

Security Innovation Network (SINET)

Security Innovation Network (SINET)

SINET is dedicated to building a cohesive, worldwide Cybersecurity community with the goal of accelerating innovation through collaboration.

TriagingX

TriagingX

TriagingX successfully created the first generation malware sandbox that is being used by many Fortune 500 companies for daily malware analysis.

Brace168

Brace168

Specialising in Cyber Security incident identification and response, Brace168 is uniquely positioned to provide a vast experience in managed security services to meet the needs of all business types.

Material Security

Material Security

Material is solving one of the most fundamental problems in security: protecting the data sitting in mailboxes.

Astrill VPN

Astrill VPN

Astrill VPN is a Seychelles based Virtual Private Network(VPN) Company.

Custodia Continuity

Custodia Continuity

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business.

DEKRA

DEKRA

DEKRA’s promise is to ensure the safety of human interaction with technology and the environment.