BUSINESS > Services > IT & Telecoms


« Back to News

2023-06-19

Mobile Authentication: The Good, The Bad & The Ugly

Mobile authentication is convenient to use and offers a sense of security, but this type of device isn’t as secure as it may seem. By Mark Bell

2023-06-14

Google's App Store - Full Of Spyware

Malicious Software Development Kit: Over 100 Android applications containing a spyware module have had 421 million downloads from Google Play.

2023-05-31

Microsoft 365 Under Threat From A New Phishing Tool

‘Greatness’: A sophisticated Phishing-as-a-Service tool deployed against manufacturing, healthcare & technology companies that use Microsoft 365.

2023-05-30

Europe - The DDoS Battlefield Of 2022

DDoS attacks are a reflection of major geo-political challenges and have become an increasingly significant part in hybrid cyber warfare. 

2023-05-26

Enabling Quantum-Safe Cryptography

End-To-End Solution: IBM has released a roadmap outlining the steps organisations can take to transition to quantum-safe cryptography.

2023-05-23

Artificial Intelligence To Replace 55,000 Telecom Jobs

A 42% Headcount Reduction: British Telecom plans a much smaller workforce and a significantly reduced cost base by deploying AI.

2023-05-22

Web Application Security Testing: A Complete Guide

Web application security testing plays a vital role in protecting sensitive data from potential threats like SQL injection and cross-site scripting.

2023-05-19

How Unsupported Technologies Threaten Business Security

Obsolete software cannot be updated or patched and hackers know that unsupported applications are their opportunity. By Steve Whiter

2023-05-15

Higher Education: Lessons In Cybersecurity

With a large potential attack surface and big  rewards for hackers, it's easy to see why universities are high on the hit list. By Chris Boyle

2023-05-12

Businesses Must Prepare For 90-Day Certificates

Google’s 90-Day Certs Are Coming: With enough time to prepare & automation readily available, there is no excuse to be caught out. By Tim Callan

2023-05-10

Open Source Software In The Cloud

Researchers have linked the significant use of open source software to an increased need for high levels of vigilance by users. 

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) addresses the emerging threats of tomorrow while protecting the reliable flow of energy to Americans today.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

ExpressVPN

ExpressVPN

ExpressVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Center for Research on Scientific & Technical Information (CERIST)

Center for Research on Scientific & Technical Information (CERIST)

CERIST is a scientific and technical research centre with activities focused in the area of networks, information systems and IT security.

Ataya & Partners

Ataya & Partners

Ataya & Partners is a consulting company that delivers data protection, cybersecurity and IT & Digital governance services.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

Hassans International Law Firm

Hassans International Law Firm

Hassans is the largest law firm in Gibraltar, providing a full range of legal services across corporate and commercial law including Data Protection and GDPR compliance.

LeadingIT

LeadingIT

Leading IT provides IT support, cloud computing, email support, cybersecurity, networking and firewall services to Chicagoland businesses.

Packetlabs

Packetlabs

Packetlabs specializes in penetration testing services and application security.

BIRD Cyber

BIRD Cyber

BIRD Cyber is a program to promote collaboration on cybersecurity and emerging technologies aimed at enhancing the cyber resilience of critical infrastructure.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

Bitdefender

Bitdefender

Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide.

Atlas Cloud

Atlas Cloud

Atlas Cloud is a UK-wide provider of managed services based in Newcastle. Our ‘research-led’ approach to IT services helps leaders make better decisions about IT for their businesses.

Jot Digital

Jot Digital

Jot Digital is a full-service technology company specializing in digital engineering, application modernization and business transformation.

Cura Technology

Cura Technology

Cura Technology offers a wide array of security solutions meticulously designed to address specific facets of your security requirements.