42 Technical support and consulting services related to security and vulnerability of, and cyberattacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analysing, integrating, repairing, and managing of cyber-security software systems; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks for use in detecting and analyzing cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; computer security threat analysis for protecting data in the nature of monitoring and collecting cyber security intelligence; providing security threat management systems, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; development, updating and maintenance of software for networks and standalone computers in the fields of security; computer consulting services in the field of analysing security intelligence data to uncover threats and prioritize, prevent against future attacks, simplify management of security data; providing services in the field of unified security analytics, namely, computer security threat analysis to measure, track and reduce cyber security risks and identify anomalous activity across computer networks; computer security consultancy services in the fields of digital media, data encryption, computer security, communication security and computer software