BUSINESS > Services > IT & Telecoms


« Back to News

2017-06-07

WannaCry Was Not A Phishing Attack

Researchers at Malwarebytes say the WannaCry ransomware threat didn’t begin with malware-infected phishing emails, as first suspected.

2017-06-06

Russian Cyber Gang Arrested By …. Russia

Russian Interior Ministry arrests major cyber criminal gang that infected over 1m Android smartphones with the CronBot Trojan.

2017-06-06

Fake Microsoft Tech-Support Using WannaCry

Action Fraud reports Tech-Support scammers claiming to be from Microsoft taking advantage of the global WannaCry ransomware attack.

2017-06-07

Instagram Launches Story Search

Social Media Contest: Instagram and Snapchat are fighting to get you to watch more than just your friends’ content.

2017-06-06

Protect Yourself Against Ransomware

Ransomware has been endemic for years. What can businesses and individuals do to protect themselves from malicious software?

2017-06-05

The Internet of Things Will Be Even More Vulnerable to Cyber Attacks

As more smart devices become connected, the world will become more exposed to attacks like the one that hit UK’s NHS. Opinion By Hannah Bryce

2017-06-01

Microsoft Buys Cybersecurity Firm

Hexadite provides technology to automate responses to cyberattacks that it says increases productivity and reduces costs for businesses.

2017-06-02

Ignoring Software Updates…

Failing to update leaves your devices vulnerable to attack. Configuring automatic updates from trusted providers makes sure these are installed regularly.

2017-06-02

WannaCry Outbreak Is Just A Tip Of An Iceberg

While WannaCry mostly hit business and government systems, the next targets could be private homes.

2017-05-30

Eight Steps For Cloud Security

Migrating corporate data to the cloud is really just a form outsourcing and testing the service provider's security means asking some hard questions.

2017-05-30

WannaCry Also Hit Windows 7 Systems

Not just unsupported networks running Windows XP were affected. Untpatched Windows 7 users also suffered from the attack.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

EY Advisory

EY Advisory

EY is a multinational professional services firm headquartered in the UK. EY Advisory service areas include Cybersecurity.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Consulting Services to help you secure your mission-critical systems.

Highland Capital Partners

Highland Capital Partners

Highland Capital Partners is an early stage venture capital firm focused on category-defining businesses in consumer and enterprise technology, including cybersecurity.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

IT Band Systems

IT Band Systems

IT Band Systems is an international provider of IT products and services including web server monitoring and web security consulting.

Maritime Cyber Threats Research Group - University of Plymouth

Maritime Cyber Threats Research Group - University of Plymouth

The Maritime Cyber Threats research group of the University of Plymouth is focused on investigating marine cyber threats and researching solutions.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

ACL Digital

ACL Digital

ACL Digital, an ALTEN Group company, is a leader in design-led digital experience, innovation, enterprise modernization, and product engineering services converging to Technology, Media & Telecom.

Bluefin Payment Systems

Bluefin Payment Systems

Bluefin is the recognized integrated payments leader in encryption and tokenization technologies that protect payments and sensitive data.

Metmox

Metmox

Metmox mission is to be trusted advisor and partner to protect our customer’s evolving Cloud, Network, Application, IT infrastructure and cybersecurity needs.

Nagomi Security

Nagomi Security

Nagomi is changing the way security teams balance risk and defense, empowering customers to focus on what matters now.

LMNTRIX

LMNTRIX

LMNTRIX eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent and respond to cyberattacks.

Vonahi Security

Vonahi Security

Vonahi Security is a cybersecurity SaaS company that pioneered automated network penetration testing.

Gray Tier Technologies (GTT)

Gray Tier Technologies (GTT)

Gray Tier is an advanced security company that focuses on developing technical solutions to the toughest cyber security challenges facing our customers.