BUSINESS > Services > IT & Telecoms


« Back to News

2022-11-15

Guilty: A Criminal Conviction For One CISO Has Consequence For Others

Doing The Right Thing: Uber’s ex-security chief has been found guilty in a US court - what does that mean for CISOs in the UK? By Nigel Jones

2022-11-22

Russia Prepares To Disconnect From The World Wide Web

Unplugged: The Russian government has been working on ways to monitor Russian citizens' Internet activities & block information from abroad. 

2022-11-21

Black Women Comprise Less Than 1% Of The IT Workforce

Racist & Sexist?: Black women, and women in general, working in tech are often where they are despite the lack of inclusive working culture.

2022-11-07

Japan Will Use AI To Secure Critical Infrastructure

Risk Based Maintenance: Using cloud-hosted SaaS software based on a decentralized database and distributed ledger technology.

2022-11-03

Is It Time To Consolidate Systems?

Too many businesses are managing multiple endpoints, incompatible dashboards & struggle to integrate systems with defences. By Colin Tankard

2022-11-02

How Long Does It Take Before An Attack Is Detected?

Hackers can stay around in your network for a long time - organisations may not even know they have been attacked & robbed until it is far too late.

2022-10-19

Spell-Checking In Google Chrome & Microsoft Edge Browsers Leak Passwords

Spell-jacking: A security flaw in browsers can expose corporate users' Login ID credentials to internal assets like databases & cloud infrastructure.

2022-10-14

Microsoft Teams Is Vulnerable To GIFShell Attacks

GIFShell: A new attack technique allows threat actors to exploit Microsoft Teams for phishing attacks and remote data theft using image files.

2022-10-07

Google Loses Its Appeal & Must Pay €4.1Billion EU Penalty

Google imposed “unlawful restrictions” on Android phone manufacturers in order to promote the Chrome search engine on mobile devices.

2022-10-07

Microsoft Warning - Windows Flaw Being Attacked

Patch Tuesday: Microsoft finds zero-day exploits capable of exploiting a flaw in Windows, tricking users into opening a malicious file.

2022-09-23

Quantum Computing Raises As Many Problems As It Solves

Quantum computing poses both opportunities and risks to the cyber security environment and above all, a serious threat to encrypted communications.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

Infosecurity Europe

Infosecurity Europe

Infosecurity Europe is Europe’s number one information security conference and exhibition.

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

Mastercard

Mastercard

MasterCard is a leading global payments solutions company that serves consumers and businesses in over 210 countries and territories worldwide.

Evidence Talks (ETL)

Evidence Talks (ETL)

A leading forensic computing authority developing unique digital forensic technologies. Tools that detect potential terrorists & criminals & used by the military, enforcement & intelligence commmunity

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

SOSA

SOSA

SOSA facilitates new growth opportunities by connecting the dots between industry verticals and innovation ecosystems around the world.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

Votiro

Votiro

Votiro is an award-winning cybersecurity company that specializes in file sanitization, ensuring every organization is safe from zero-day and undisclosed attacks.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

Digital Intelligence

Digital Intelligence

Digital Intelligence offer a full array of products, forensic and e-discovery consulting services and training.

KingsGuard Solutions

KingsGuard Solutions

KingsGuard Solutions is a San Diego Cybersecurity company that specializes in complex and innovative security solutions for companies throughout Southern California.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.

AVANT Communications

AVANT Communications

AVANT is a premier distributor of next generation technologies with the resources and relationships needed to successfully navigate the ever-changing world of communications and IT infrastructure.

Cloudbrink

Cloudbrink

Cloudbrink is purpose-built to deliver the industry’s highest performance connectivity to remote and hybrid workers, anywhere in the world.

ClearFocus Technologies

ClearFocus Technologies

ClearFocus Technologies provides advanced cybersecurity services that secure our nation’s most sensitive assets.

Socket

Socket

Socket protects software applications and critical services from malware and security threats originating in open source code.