BUSINESS > Services > IT & Telecoms


« Back to News

2023-09-26

Severe Risks From Remote Access Exposure

Response Time: Organisations are finding it difficult to manage their attack surfaces at a speed & scale necessary to combat threat actor automation.

2023-09-20

The Worst Places To Connect To Public Wi-Fi

If your employees use public Wi-Fi networks, there is a high chance of malware infection. How can you protect both your people and your business?

2023-09-11

Elon Musk Withheld Starlink Over Crimea

Electric Cars, Space Exploration, Neurotechnology & Social Media Are Not Enough: Elon Musk decides to intervene in geopolitics.

2023-09-14

CISA's Post-Quantum Cryptography Initiative

As quantum computing advances, it presents an increasing risk to widely used encryption methods. A new technology standard is needed.

2023-09-08

Qakbot Malware Taken Down

Qakbot malware infected victims via spam emails with malicious attachments, links and served as a platform for ransomware operators. 

2023-09-07

The Unique TTPs Attackers Use To Target APIs

Application Programming Interfaces are the gateways to key data, and attackers will go to extraordinary lengths to compromise them. By Andy Mills

2023-09-07

Why Are WhatsApp Users So Easy To Scam?

Scammers Are Relentlessly Targeting WhatsApp Users: Eight effective steps you can take to keep yourself safe (updated). By François Rodriguez

2023-09-01

Empower Your DaaS Programs

Classroom Security: Managed cybersecurity service features like Device-as-a-Service can provide a competitive edge for schools. By Nadav Avni

2023-08-28

British Police On High Alert After Supply Chain Breach

London's Metropolitan Police issue a serious alert as cyber criminals breach an IT supplier responsible for ID cards and restricted access passes.

2023-08-23

Identifying & Analysing Emerging Cloud Threats

The sheer speed and scope of the cloud native environment demands smarter decisions when prioritising limited resources. By Nurit Bielorai

2023-08-22

How To Check Out Suppliers Before You Commit

Supply Chain Risk: It's now possible to execute automatic searches of a supplier’s digital presence without needing consent. By Abdullah Mirza

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

Learn about the top cloud security trends in 2024 and beyond, along with solutions and controls you can implement as part of your security strategy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Panzura

Panzura

Panzura optimizes enterprise data storage management and distribution in the cloud, making cloud storage simple and secure.

Alert Logic

Alert Logic

Alert Logic delivers unrivaled security for any environment, delivering industry-leading managed detection and response (MDR) and web application firewall (WAF) solutions.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

CARICERT

CARICERT

CARICERT is the National Cyber Emergency Response Team of Curacao in the Caribbean.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

GrrCON

GrrCON

GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people.

Deepwatch

Deepwatch

deepwatch’s cloud SecOps platform and relentless customer focus are redefining the managed security services industry.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

SuperCom

SuperCom

SuperCom are a global secure solutions integrator and technology provider for governments and other consumers facing organizations around the world.

Cyber Resilience Centre for Wales (WCRC)

Cyber Resilience Centre for Wales (WCRC)

The Cyber Resilience Centre for Wales (WCRC) is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

Codean

Codean

The Codean Review Environment automates mundane software analysis tasks, so security experts can focus on finding vulnerabilities.

Detego Global

Detego Global

Detego Global are the creators of the Detego® Unified Digital Forensics Platform, a suite of modular tools used globally by military, law enforcement and intelligence agencies, and enterprises.

ProArch

ProArch

ProArch is a global team of multidisciplinary experts in cloud, infrastructure, data analytics, cybersecurity, compliance, and software development.

Memcyco

Memcyco

Memcyco is a provider of cutting-edge digital trust technologies to empower brands in combating online brand impersonation fraud, and preventing fraud damages to businesses and their clients.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.

Intracis

Intracis

Intracis is a 'Made in India' cyber incident management solution aimed at ‘Making Security Simple’ by simplifying cyber incident management for CERTS and CSIRTS.