BUSINESS > Services > IT & Telecoms


« Back to News

2017-04-19

Stop Data Breaches, Start With Databases

A common source for numerous large scale data breaches are poorly secured databases that connect directly to the internet.

2017-04-14

Strategies To Prevent 85% Of Cyber Attacks

If network administrators implement these seven basic precautions they could prevent as many as 85 percent of targeted cyber attacks.

2017-04-12

ISPs Can Tell Users About Infected Computers

ISPs can spot malicious patterns of activity over the Internet and even pinpoint the IP addresses that are being used for cybercrime.

2017-04-11

Cloudbleed Is Just The Latest Internet Security Disaster

A tiny coding bug has led to an unknown quantity of data, passwords, personal information, messages & cookies, to leak all over the Internet.

2017-03-22

New Malware Hides In Memory

DNSMessenger: Researchers at the Talos threat research group have published a report on a new form of malware that’s very difficult to detect.

2017-03-21

A Common Language For Sharing Intelligence On Cybersecurity Threats

Threat analysts need a more robust framework for characterizing suspicious activity on their endpoints and networks. By Jane Ginn

2017-03-21

Keeping The Cloud Safe: Exclusive Report

IT Managers are struggling keep their business applications and data safe in the Cloud, and many are slowing down adopting Cloud processes.

2017-04-05

Turn Threat Data Into Threat Intelligence

Using threat intelligence from others to protect your own organisation is a powerful concept, except when the other data is misleading or wrong.

2017-04-21

Malvertising Targets Your Online Users

Many of the most popular websites have at one time or another unwittingly hosted malicious ads.

2017-02-24

DDoS Protection: 14 Unique Ways to Protect Your Organisation

DDoS attacks have become a nightmare for companies with an active online presence. Here are 14 ways to protect your business.

2017-02-21

Hard To Keep The Cloud Safe Without Skills

IT managers are finding it difficult to keep their applications and data safe in the cloud, and many are slowing cloud adoption because of it.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Kualitatem

Kualitatem

Kualitatem Inc. is an independent software testing and information systems auditing company

SecWest

SecWest

SecWest is the organizer of CanSecWest, PACSEC, originator of PWN2OWN, security auditing, and virtual engagement/training.

CounterCraft

CounterCraft

The CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection.

Adzuna

Adzuna

Adzuna is a search engine for job ads used by over 10 million visitors per month that aims to list every job everywhere, including thousands of vacancies in Cybersecurity.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

VariQ

VariQ

VariQ is a premier provider of Cybersecurity, Software Development and Cloud services to federal, state, and local government.

EnigmaSoft

EnigmaSoft

EnigmaSoft is known for its PC anti-malware remediation utility and service under the tradename SpyHunter.

Apptega

Apptega

Apptega is an award-Winning Cybersecurity and Compliance Platform. Our mission is to make cybersecurity and compliance easy for everyone.

HackEDU

HackEDU

HackEDU provides secure coding training to companies ranging from startups to the Fortune 500.

GM Sectec

GM Sectec

GM Sectec is the world's largest independent Cyber Defense and Fraud Prevention firm laser focused on payment security.

Opus Security

Opus Security

Opus dramatically reduces cloud security risks by enabling teams to define, orchestrate, automate and measure remediation processes across the entire distributed organization.

Phriendly Phishing

Phriendly Phishing

Phriendly Phishing offers phishing awareness training programs designed to ward off potential security threats and minimise the impact of cyber attacks.

M.Tech

M.Tech

M.Tech is a leading cyber security and network performance solutions provider. We work with leading vendors to bring optimal solutions to the market through a channel of reseller partners.

Panoplia Digital Protection

Panoplia Digital Protection

Panoplia Digital Protection is a cutting-edge cybersecurity company that leverages the power of AI and ML to help businesses and consumers protect themselves against cyber threats.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.

RST Cloud

RST Cloud

RST Cloud is a cutting-edge technology company that specialises in threat intelligence solutions for businesses of all sizes.