BUSINESS > Services > IT & Telecoms


« Back to News

2024-07-10

Navigating The Complexities Of Data Backups In A Hybrid World

Going Hybrid: Many businesses mistakenly believe that cloud providers handle all backup needs, but this is usually not the case. By Brent Torre

2024-07-09

Chinese Hackers Exploit Cisco Vulnerability To Deliver Malware

Velvet Ant: A command injection exploit that allows an authenticated, local attacker to execute arbitrary commands without syslog alert messages.

2024-07-02

RCE Vulnerability In OpenSSH Server

OpenSSHion: An old vulnerability has resurfaced and millions of systems are exposed to unauthorised control, needing urgent mitigation.

2024-06-27

Malware Targeting Smart TVs

Pandoraspear malware, which targets smart TVs running an open-source Android OS, has jumped into the top 10 most widely detected malware list.

2024-06-25

Hackers Use Windows Backdoor To Deliver BadSpace

Fake Browser Update: A multi-stage attack chain involving an infected website, a command-and-control server, and a JScript downloader.

2024-06-18

Top Ten IoT Security Challenges & Solutions

The interconnected nature of IoT devices amplifies the importance of maintaining strong security practices across all levels of the network.

2024-06-14

Too Many Tools - Cybersecurity Professionals Feel Out Of Control 

An average cybersecurity stack comprises 32 solutions, highlighting the need for consolidated platforms to deal with growing complexity.

2024-06-11

Is Encryption Falling Out Of Favour?

An alarming number of organisations have gone backwards in protecting vital information, heightening the risk of data exposure. By Jon Fielding

2024-06-07

OpenTofu's New State File Encryption Is A Boon For IaC Security

Open-source Infrastructure as Code Tool: OpenTofu's new state file encryption feature is a significant milestone for IaC security.

2024-06-03

Increasing Software Cyber Resilience

A new ‘Code of Practice for Software Vendors’ will ensure that security is fundamental to developing and distributing products and services. 

2024-06-01

A Single Attack Disabled Half A Million Routers

Details emerging about a 2023 exploit which knocked out over 600,000 routers in an unprecedented attack against a single Internet Service Provider.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

AdNovum Informatik

AdNovum Informatik

AdNovum Informatik provides a full set of IT services, ranging from consulting, the conception and implementation of customized business and security solutions to maintenance and support.

ControlCase

ControlCase

ControlCase provide solutions that address all aspects of IT-GRCM (Governance, Risk Management and Compliance Management).

Haystax Technology

Haystax Technology

Haystax’s security analytics platform applies artificial intelligence techniques to identify and prioritize threats in real time.

Network Box

Network Box

Network Box is one of the world's leading Managed Security Service Providers.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

Munich Re

Munich Re

Munich Re is a leading global provider of reinsurance, primary insurance and insurance-related risk solutions including Cyber.

ThreatModeler

ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s Software Development Lifecycle by identifying, predicting and defining threats.

NeuVector

NeuVector

NeuVector, the leader in Full Lifecycle Container Security, delivers uncompromising end-to-end security from DevOps vulnerability protection to complete protection in production.

GeoEdge

GeoEdge

GeoEdge is the premier provider of ad security and quality solutions for the online and mobile advertising ecosystem.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

Tozny

Tozny

Tozny offers products with security and privacy in mind that are built on the foundation of end-to-end encryption, and open-source verifiable software.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.

Tranchulus

Tranchulus

Tranchulus are a global provider of offensive and defensive cyber solutions, information security assessment, compliance and managed security services.

SOC-E

SOC-E

SOC-E is a leading technology provider for high-availability and deterministic networking, sub-microsecond synchronization and cybersecurity solutions for critical sectors.