BUSINESS > Services > IT & Telecoms


« Back to News

2024-10-09

Pakistan Joins The Top Tier Of Global Cybersecurity

Pakistan has moved up to join the Top 50 in the ITU Global Cyber Security Index, in major boost to international confidence in the national economy.

2024-09-24

Chinese Botnet Deployed To Infect Critical Infrastructure

Chinese threat groups are using rigged IoT devices to hack US and other organisations, presenting an increased threat to critical infrastructure.

2024-10-07

Data Centres Are Just As Important As The Power Grid & Healthcare

The recent global IT outage caused by CrowdStrike has shown why keeping Data Centres secure and safe is critical to the UK.

2024-10-03

Attackers Can Use RAM To Steal Data From Air-Gapped Networks

RAMBO: A new attack technique that relies on radio signals from memory buses to exfiltrate data from exceptionally high security air-gapped systems.

2024-10-15

Data Centres Given Critical National Infrastructure Status In Britain

The UK government wants to promote resilience & security of data centres, What does this mean for data centre providers? By Varney & McCarron

2024-09-17

Try These Virtual Private Network Alternatives Yourself Now 

Centralized VPNs are a valid solution for web security, although they have been known to leak user data. What are the alternative solutions?

2024-09-26

AI-Powered Translation: A Bridge Between IT & Business

AI-powered translation can break down language barriers, particularly when it comes to translating complex technological jargon. By Paul Maksimovic 

2024-09-16

What Android Users Need To Know About New Malware

SpyAgent: A new Android mobile malware which targets mnemonic keys by scanning your device for recognisable images. By Oliver Devane

2024-09-10

The Impact Of 5G On iGaming

5G technology accelerates data transfer speeds, resulting in higher quality gaming visuals and more in-depth mechanics for casino games.

2024-09-16

Russian Hackers Exploit Mobile Browser Vulnerabilities

Researchers identify multiple campaigns exploiting Internet browsers flaws using methods very like those first developed by NSO Group.

2024-09-02

The Rise Of SD-WAN And Its Implications For Security & Performance

Navigating The Future Of Networking: The deployment of SD-WAN should go hand in hand with increased cyber surveillance. By John Diamond

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

AtkinsRéalis

AtkinsRéalis

AtkinsRealis is a market-leading design, engineering and project management consultancy operating in fields ranging from infrastructure, through energy and transport to cybersecurity.

Security Brokers

Security Brokers

Security Brokers focus services and solutions with a focus on strategic ICT Security and Cyber Defense issues.

7 Elements

7 Elements

7 Elements is an independent IT security testing company providing expertise in technical information assurance through security testing, incident response and consultancy.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

PatrOwl

PatrOwl

Automate your SecOps with PatrOwl, and start defending your assets efficiently.

Enclave Networks

Enclave Networks

Our mission is to give IT professionals a simple way to rapidly build secure connectivity between any application, computer system, device or infrastructure - regardless of the underlying network.

Grayshift

Grayshift

Grayshift is the leading provider of mobile device digital forensics, specializing in lawful access and extraction.

CleanCloud by SEK

CleanCloud by SEK

CleanCloud by SEK is a CSPM product focused on public cloud data protection and security regulations, with over 400 compliance checks for the market's leading frameworks and regulations.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

Sparrow

Sparrow

Sparrow specializes in application security testing solutions to cope with new technology trends such as cloud, mobile, and DevSecOps.

Alibaba Cloud

Alibaba Cloud

Alibaba Cloud is committed to safeguarding the cloud security for every business by leveraging a comprehensive suite of enterprise security services and products on the platform.

Aleo

Aleo

Aleo is building the world's leading developer platform for enabling absolute privacy on blockchains.

Green Enterprise Solutions

Green Enterprise Solutions

Green Enterprise Solutions are a Namibian company providing Information and Communication Technology (ICT) services to corporate Namibia.

Protos Labs

Protos Labs

Protos Labs enables insurers & enterprises to make better cyber risk decisions through holistic, real-time risk management tools.

Offenso Hackers Academy

Offenso Hackers Academy

At Offenso we focus on cyber security training focused on producing cyber security professionals with a wide range of abilities to counter threats from the internet and cloud to a business.

SPYROS Information & Technology Consulting

SPYROS Information & Technology Consulting

SPYROS specializes in providing highly qualified professionals in Computer Network Operations, Signals Intelligence, Technical Training and Certifications, Network Administration and Security.