BUSINESS > Services > IT & Telecoms


« Back to News

2024-05-20

A Critical Vulnerability In The Post-PSTIA Era 

The Human Factor: To truly fortify our cybersecurity in this new era, we must address the elephant in the room. By James O'Sullivan

2024-05-16

A Way To Build A Comprehensive Backup Strategy 

Jira Backup Best Practices: Organizations that implement these practices improve task accessibility & guarantee quick recovery with a few clicks.

2024-05-10

Overcome PDF Conversion Challenges: A Step-by-Step Guide

Navigating PDF Conversion Challenges: Explore common issues and discover top tools for accurate and seamless conversions. 

2024-05-13

Dell Hacked - 49m Customers Exposed 

Menelik At Work: If you have been a Dell customer in the past seven years, it’s likely that your customer data is on the Dark Web now.

2024-05-10

Mobile Gambling - Sportsbooks Face Growing Fraud

Risk & Return: Mobile betting App users face a growing threat from fraud and their operators should take steps to protect them. By Elie Shuggi

2024-05-07

Neutralizing Cyber Threats In SaaS Applications

Any business using SaaS applications opens itself to numerous security risks. Here are the best practices to prevent costly breaches. By Matt Verlaque

2024-05-08

Microsoft Reforms ‘Weak’ Cyber Security Strategy

Do Security: Microsoft's reputation for security is suffering after criticism of the company’s weak cyber practices and lax corporate culture.

2024-05-02

Attacks Against Cisco Firewall Platforms

Detected: A new targeted malware campaign exploiting zero-day flaws in Cisco networking gear to deliver custom malware and enable data theft.

2024-04-30

AWS & Google Agree To Drop Cloud Service Exit Fees

Data Portability & Cloud Interoperability: A multicloud strategy is becoming less expensive, optimising the flow of data. By Jamil Ahmed

2024-04-25

Creating Successful Cybersecurity Solutions

From Bolt-On To Built-In: Not all cyber security resilience products are equal. What issues should software designers be focusing on? By Vincent Lomba

2024-04-22

The Evolving Cybersecurity Vulnerability Landscape

Only by continually updating their security posture can businesses ensure they are well-equipped to handle dynamic cyber threats. By Douglas McKee

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CloudDNA

CloudDNA

CloudDNA deliver solutions that enable users and devices to connect over high performance, secure, efficient, scalable cloud networks.

Stratogent

Stratogent

Stratogent does IT and Cybersecurity operations. We specialize in high-touch and high-change IT environments, especially in the biotech and pharma industry verticals.

CyberSource

CyberSource

CyberSource provides online payment and fraud management services for medium and large-sized merchants.

KPN Security

KPN Security

KPN Security is the largest and most complete provider of IT security services in the Netherlands.

Silensec

Silensec

Silensec is a management consulting, technology services and training company specialized in information security.

National Centre for Cyber Security (NCCS) - Pakistan

National Centre for Cyber Security (NCCS) - Pakistan

National Centre for Cyber Security (NCCS) undertakes cyber security research and plays a leading role in securing Pakistan’s Cyberspace.

Secure Recruitment

Secure Recruitment

Secure Recruitment is a specialist Executive Search business that focuses its efforts on attracting specific exceptional talent in Cyber Security.

Digi International

Digi International

Digi is a leading global provider of mission-critical and business-critical machine-to-machine (M2M) and Internet of Things (IoT) connectivity products and services.

Argo Group

Argo Group

Argo is an international underwriter of specialty insurance. Argo Cyber offers a full spectrum of coverage solutions related to professional and technology services.

Echosec Systems

Echosec Systems

Echosec Systems is a data discovery company delivering social media and dark web threat intelligence. Our web based security software delivers critical information for situational awareness.

BigPanda

BigPanda

BigPanda is the first provider of Autonomous Operations solutions that empower IT Operations at large, complex enterprises.

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

OmniCyber Security

OmniCyber Security

Omni is a cyber security firm specialising in Penetration Testing, Managed Security and Compliance.

Spike Reply

Spike Reply

Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection.

Rayzone Group

Rayzone Group

Rayzone Group offers a wide range of Cyber Security solutions and services, providing hollistic protection suitable for both enterprises and National cyber security centers.

Virtual IT Group (VITG)

Virtual IT Group (VITG)

VITG is a cyber security-focused Managed Service Provider (MSP).