BUSINESS > Services > IT & Telecoms


« Back to News

2023-09-11

Elon Musk Withheld Starlink Over Crimea

Electric Cars, Space Exploration, Neurotechnology & Social Media Are Not Enough: Elon Musk decides to intervene in geopolitics.

2023-09-14

CISA's Post-Quantum Cryptography Initiative

As quantum computing advances, it presents an increasing risk to widely used encryption methods. A new technology standard is needed.

2023-09-08

Qakbot Malware Taken Down

Qakbot malware infected victims via spam emails with malicious attachments, links and served as a platform for ransomware operators. 

2023-09-07

The Unique TTPs Attackers Use To Target APIs

Application Programming Interfaces are the gateways to key data, and attackers will go to extraordinary lengths to compromise them. By Andy Mills

2023-09-07

Why Are WhatsApp Users So Easy To Scam?

Scammers Are Relentlessly Targeting WhatsApp Users: Eight effective steps you can take to keep yourself safe (updated). By François Rodriguez

2023-09-01

Empower Your DaaS Programs

Classroom Security: Managed cybersecurity service features like Device-as-a-Service can provide a competitive edge for schools. By Nadav Avni

2023-08-28

British Police On High Alert After Supply Chain Breach

London's Metropolitan Police issue a serious alert as cyber criminals breach an IT supplier responsible for ID cards and restricted access passes.

2023-08-23

Identifying & Analysing Emerging Cloud Threats

The sheer speed and scope of the cloud native environment demands smarter decisions when prioritising limited resources. By Nurit Bielorai

2023-08-22

How To Check Out Suppliers Before You Commit

Supply Chain Risk: It's now possible to execute automatic searches of a supplier’s digital presence without needing consent. By Abdullah Mirza

2023-08-22

How AI & VoIP Are Revolutionizing Communications

AI Powered Interactions: AI has a real chance to revolutionize communication in manners that humans are only now starting to fully comprehend.

2023-08-15

Protecting Against The $6.7Bn SMS Pumping Fraud Scam

Warning: Criminals can exploit businesses who use SMS One-Time Passwords as part of a two-factor authentication process. By Paul McGuire 

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

EdgeWave

EdgeWave

EdgeWave provides simple but highly effective data security and advanced threat protection in solutions that are affordable, scalable and easy to use.

ElcomSoft

ElcomSoft

ElcomSoft is a global leader in computer and mobile forensics, IT security and forensic data recovery.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

C3.ai

C3.ai

The C3 AI Suite supports configurable, pre-built, high value AI applications for predictive maintenance, fraud detection, anti-money laundering, sensor network health and more.

Syskode Technologies

Syskode Technologies

Sykode Technologies is a next-generation global technology company offering an integrated portfolio of advisory services, products and solutions in areas including AI, IoT and Cyber Security.

Ensconce Data Technology (EDT)

Ensconce Data Technology (EDT)

EDT’s focus is on providing solutions to properly sanitize Solid State Drives (SSD) and Magnetic Drives (HDD) before they are disposed or redeployed.

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative is an information security and cyber security company with 40-plus years of experience across industry & government.

Cyber NYC

Cyber NYC

Cyber NYC is a suite of strategic investments to grow New York City’s cybersecurity workforce, help companies drive innovation, and build networks and community spaces.

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

CyberWhite

CyberWhite

CyberWhite is a disruptive provider of cyber security and risk mitigation solutions.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Privafy

Privafy

Privafy helps mobile service providers, IoT manufactures , and enterprises redefine the way they protect Data-in-Motion.

Infuse Technology

Infuse Technology

Infuse Technology provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

ArmorPoint

ArmorPoint

ArmorPoint redefines the traditional approach to cybersecurity by combining network operations, security operations, and SIEM technology in one platform.