Hip Hop
Regular readers of these ramblings will remember that we first reported about the nefarious activities of the Chinese hacking outfit APT10 way back in April 2017 after its activities were brought [...]
Regular readers of these ramblings will remember that we first reported about the nefarious activities of the Chinese hacking outfit APT10 way back in April 2017 after its activities were brought [...]
Article by Robert Scammell – Verdict Tensions between Iran and the US are high as the conflict shifts between the physical world and the digital. Last Thursday US president Donald Trump [...]
Article by Sooraj Shah – Forbes It’s no surprise that high net worth individuals are the perfect candidates for cybercriminals to attack. They have significant financial resources, [...]
For some time, we have heard rumours circulating in some of the darker parts of the web about issues with Oracle’s WebLogic, exploitable issues with proof of concept attacks being tested, [...]
Priority: Critical Executive Summary: A new critical vulnerability has been discovered that affects several versions of the Oracle WebLogic server. The bug has classed as critical-level security [...]
This week, the brilliant/devious (delete as applicable) folks at Kaspersky called out the mighty Google for allowing its own applications to be facilitators of spam, often containing malicious [...]
Presented by Anna Delaney – TEISS 07 June 2019 Why has the US banned the use of Chinese company Huawei’s technology? To what extent is Huawei a security threat? What are the deeper issues [...]
This week has seen a large number of hacking announcements; it is going to be tricky to squeeze even the interesting ones into a single blog, but here goes. To our mind, the announcement by [...]
Article by Miranda Blazeby – Boat International Tales of successfully hacked superyachts are be hard to come by. Owners are reluctant to recount personal experiences of loss to hackers and [...]
UK Office
10th Floor, 5 Churchill Place, London E14 5HU, UK
Tel: +44 (0) 20 7517 3900
E-mail:
[email protected]
Concerned your cyber security isn’t up to scratch?
If the answer is ‘yes’, then discover more about how we can help you
US Office
1701 Pennsylvania Avenue, NW
Washington, DC 20006
Tel: +1 202-452-9133
E-mail:
[email protected]
Here’s how we approach things:
These targets are dependant on the candidate’s availability.
For other roles we still move quickly and aim to have everything agreed within 30 days.
Next>>
The ITC headquarters is based in the heart of London’s Docklands, just two minutes walk from Crossharbour DLR station. We have secure, modern, open-plan offices, with an expansive view and a relaxed atmosphere.
And in addition:
Next>>
If you know your NIST from your ISO27001, have a passion for all things cyber – from network architectures and patching, to cryptographic hashing and cipher functions – and are as comfortable discussing issues with a client as you are examining a threat landscape, then this could be the job for you.
It’ll involve:
For other roles please follow links to the right.
Our Cyber Advisors provide a dedicated service, focusing solely on enabling large and mid-market enterprises navigate complex cyber security issues and meet regulatory requirements. Taking a holistic approach, our experts assess a client’s cyber maturity, and provide guidance to help them identify, understand and manage their security challenges.
ITC Global Advisors is a unit that connects private sector innovation to global and national security challenges. It collaborates with government agencies, engages with the private sector, handles cyber crisis incidents and creates customised communication strategies.
We offer cyber security and information management as a service to large and mid-market clients, enabling them to protect their critical data assets across on-premises and cloud-based infrastructures. Our scalable and cost-effective solutions deliver comprehensive threat intelligence, detection, management and response.
Contact us below to find out the benefits of our Firewall Governance Service.
Contact us below to find out how we utilise this service within our NetSure360º Managed Solutions.
Contact us below to find out how we utilise Cisco within our NetSure360º Managed Behavioural Analytics Solution.
Contact us below to find out how we utilise Cisco within our NetSure360º Managed Threat Intelligence Solution.
Contact us below to find out how we utilise Cisco within our NetSure360º Managed Firewall Solution.