BUSINESS > Services > IT & Telecoms


« Back to News

2017-07-05

Ukraine Police Trace Petya Attack Source

A vulnerability within an obscure piece of Ukrainian accounting software is the root cause of the massive Petya cyberattack.

2017-07-03

Latest: All About Petya

The current Petya infestation spreads as rapidly and indiscriminately as WannaCry did, but it's better crafted and more dangerous.

2017-07-03

App Or Browser: Which Is Safer For Online Banking?

If you need to make a transaction on the go banking apps ought to be more secure than browsers, but it isn’t necessarily so.

2017-06-30

Petya Cyber Attack Update

“Petya” ransomware has caused serious disruption at large firms and paying the ransom does not work. Take defensive action.

2017-06-29

Petya Cyber Attack Hits EU & US

Victims of a major ransomware attack that has spread through the US and Europe can no longer unlock their computers, even if they pay the ransom.

2017-06-28

EU Fines Google $2.7 Billion

Google systematically gave prominent placement in searches to its own comparison shopping service and demoted rivals in search results.

2017-06-28

Petya: The Latest  Global Ransomware Incident

Petya works similarly to the WannaCry ransomware that infected more than 230,000 computers in 150 countries last month.

2017-06-27

Information Security Forum Launches - Threat Intelligence Report

A new report from the widely respected ISF aims to help organisations to find and use threat intelligence much more effectively.

2017-06-27

NHS Cyberattack Was 'launched from N. Korea'

The UK's NCSC confirm the view that the Wannacry attack which badly affected the National Health Service was perpetrated by N. Korea.

2017-06-26

Google 'faces €1bn-plus fine' From EU

Google at risk of record-breaking fine from Brussels of more than €1bn (£875m) over alleged abuse of its market dominance.

2017-06-21

Cybersecurity Can Learn From Maritime Security

The Internet is similar to the oceans and seas and cybersecurity crosses boundaries similar to drug smuggling and piracy.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

A10 Networks

A10 Networks

A10 Networks is a leader in application networking, helping organizations of all sizes to accelerate, optimize and secure their applications.

Prim'X Technologies

Prim'X Technologies

Prim'X Technologies provides information protection solutions to prevent unauthorised access to sensitive data.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

Crest International

Crest International

Crest is focused on professionalizing the technical cyber security market whilst driving quality and standards of organizations that operate within it.

GuardiCore

GuardiCore

GuardiCore is an innovator in internal data center security and breach detection and is transforming security inside data centers and clouds.

Kapalya

Kapalya

Kapalya empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application.

Identity Defined Security Alliance (IDSA)

Identity Defined Security Alliance (IDSA)

IDSA is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies.

TM One

TM One

TM One is the enterprise and public sector business solutions arm of Telekom Malaysia Berhad (TM) Group.

Axxum Technologies

Axxum Technologies

Axxum Technologies is a premier provider of Network Communications and Information Technology Security Solutions.

SecurIT360

SecurIT360

SecurIT360 is a full-service specialized Cyber Security and Compliance consulting firm.

Department of Homeland Security (DHS)

Department of Homeland Security (DHS)

The Department of Homeland Security has a vital mission: to secure the nation from the many threats we face. Our duties are wide-ranging, but our goal is clear - keeping America safe.

Antivirus Tales

Antivirus Tales

Antivirus Tales offers a platform to resolve all types of antivirus-related issues. The platform also provide various blog articles and informative guides to fix antivirus software errors.

OpenAI

OpenAI

OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.

Infima Cybersecurity

Infima Cybersecurity

INFIMA tackle the hard parts of managing your Security Awareness Training program so you can focus elsewhere.

Invary

Invary

Invary's expert Runtime Integrity solution, powered by NSA-licensed technology, verifies the security and confidentiality of your system.