BUSINESS > Services > IT & Telecoms


« Back to News

2024-10-15

Data Centres Given Critical National Infrastructure Status In Britain

The UK government wants to promote resilience & security of data centres, What does this mean for data centre providers? By Varney & McCarron

2024-09-17

Try These Virtual Private Network Alternatives Yourself Now 

Centralized VPNs are a valid solution for web security, although they have been known to leak user data. What are the alternative solutions?

2024-09-26

AI-Powered Translation: A Bridge Between IT & Business

AI-powered translation can break down language barriers, particularly when it comes to translating complex technological jargon. By Paul Maksimovic 

2024-09-16

What Android Users Need To Know About New Malware

SpyAgent: A new Android mobile malware which targets mnemonic keys by scanning your device for recognisable images. By Oliver Devane

2024-09-10

The Impact Of 5G On iGaming

5G technology accelerates data transfer speeds, resulting in higher quality gaming visuals and more in-depth mechanics for casino games.

2024-09-16

Russian Hackers Exploit Mobile Browser Vulnerabilities

Researchers identify multiple campaigns exploiting Internet browsers flaws using methods very like those first developed by NSO Group.

2024-09-02

The Rise Of SD-WAN And Its Implications For Security & Performance

Navigating The Future Of Networking: The deployment of SD-WAN should go hand in hand with increased cyber surveillance. By John Diamond

2024-08-28

For Many Businesses Experiencing MultiCloud Data Breach, Multi-Cloud Security Could Be The Answer

There are common challenges associated with securing multi-cloud environments and multi-cloud security can help prevent these breaches.

2024-08-25

Virtual Numbers & eSIM Technology Compared

Virtual Numbers: A profitable alternative to traditional telephone communication - they are not tied to a specific location and constantly available.

2024-08-22

How Can You Scan Your Mac For Existing Malware?

Macs have a great reputation, but users need to take steps to identify potentially dangerous malware that might steal their identity & delete files.

2024-08-20

North Korean IT Contractor Fraud

Laptop Farming: North Korean IT workers were logging on to work from locations in China, while appearing to be contractors located in the US.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

SI-CERT

SI-CERT

SI-CERT (Slovenian Computer Emergency Response Team) is the national cyber scurity incident response center for Slovenia.

Securi-Tay

Securi-Tay

Securi-Tay is an information Security conference held by the Ethical Hacking Society at Abertay University, Dundee.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Edvance

Edvance

Edvance operates a range of cybersecurity businesses including value added cybersecurity solutions distribution, security technology innovation and development, and SaS solution offerings.

Lightship Security

Lightship Security

Lightship Security is an accredited Common Criteria and FIPS 140-2 IT security testing laboratory that specializes in test conformance automation solutions and IT product security certifications.

FutureCon Events

FutureCon Events

FutureCon produces cutting edge events aimed for Senior Level Professionals working in the security community, bringing together the best minds in the industry for a unique cybersecurity event.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

EBRAND Services

EBRAND Services

EBRAND, the European experts for brand protection on the Internet. We offer a full set of services including cybermonitoring, fighting counterfeiting offences and online security.

BullGuard

BullGuard

BullGuard is an award-winning cybersecurity company focused on providing the consumer and small business markets with the confidence to use the internet in absolute safety.

Computer Services Inc (CSI)

Computer Services Inc (CSI)

CSI is a leading fintech, regtech and cybersecurity solutions partner operating at the intersection of innovation and service.

Cider Security

Cider Security

Cider Security - It’s time to revolutionize the way Security, Dev and DevOps teams work together to supercharge security at the speed of engineering.

CERT.JE

CERT.JE

CERT.JE is responsible for promoting and improving the cyber resilience across the critical national infrastructure, business communities and citizens in Jersey.

ShellBoxes

ShellBoxes

ShellBoxes are a leading Web3 company focused on providing top-notch blockchain security and development services.

CyberXpert

CyberXpert

CyberXpert is your cybersecurity partner for the public and private sector in Belgium.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.

Digital Twin Consortium (DTC)

Digital Twin Consortium (DTC)

Digital Twin Consortium is a global ecosystem of users who are driving best practices for digital twin usage and defining requirements for new digital twin standards.