BUSINESS > Services > IT & Telecoms


« Back to News

2021-08-04

Cyber Security Standards For Critical Infrastructure

The White House issues a national security memo instructing CISA & NIST to establish cyber security performance goals for critical infrastructure.

2021-08-05

Home Working Creates More Cyber Attacks

As organisations prepare for a post-Covid world, one of the many issues they will have to address is much better IT security for home workers.

2021-08-04

New Tools Optimise Use Of Existing Data

Advances in cloud-based analytic tools are providing cost-effective operational improvements to ageing IT systems across many sectors.

2021-07-26

The Semiconductor Shortage Is Causing Cyber Security Problems

The global shortage of semiconductors increases the risk of the use of counterfeit parts with serious implications for data loss and IP theft.

2021-07-22

IBM Watson In Demand

IBM Watson's 'AI-for-Hire' service is poised to grow 30%, driven by Healthcare and Financial Services customers looking for real time data processing.

2021-07-17

For Sale - Dark Web Exploits

Older exploits are cheaper and remain useful to cyber criminals for longer. Its just as important to update and patch for these as for Zero-Days.

2021-07-16

Microsoft Buys RiskIQ

RiskIQ offers threat intelligence & cloud-based software used by 30% of the Fortune 500 and more than 6,000 organisations around the world.

2021-07-06

Swedish Supermarkets Closed Down By US Ransomware Attack

Overspill: A supermarket chain in Sweden is one of a growing number of overseas organisations affected by attack on IT software supplier Kaseya.

2021-07-06

$70m Ransom Demand To Restore Hacked Data

The REvil cyber crime group have significantly raised the bar for the level of ransom demanded in their widespread attack on Kaseya customers.

2021-07-05

Technical Debt Is A Serious Threat To Innovation

Technical debt is a technical design or development choice made for short-term benefit with long-term consequences for cyber security.

2021-06-24

Mobile Users Are A Security Weakspot

Remote Working & Mobile Access: IT decision makers believe their organisations are more vulnerable to mobile cyber attacks than ever.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

2|SEC Consulting (2-SEC)

2|SEC Consulting (2-SEC)

At 2|SEC Consulting, we deliver an end-to-end service of cyber and information security solutions which are tailored to each client’s exact security needs.

ABL Cyber Academy

ABL Cyber Academy

ABL provide certified training courses in the field of cyber security and IT project management.

Apomatix

Apomatix

Apomatix is a platform that simplifies the complexity of cyber risk audit and management.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Netrix

Netrix

Netrix is a Mexican company specialized in IT Security, with more than 18 years of experience in Managed Services, Professional Services and Turnkey Solutions related to Security.

CopSonic

CopSonic

Copsonic provide a technology solution based on ultrasonic waves to send secure and encrypted data between two devices in order to achieve authentication.

Infopulse

Infopulse

Infopulse is a global provider of Software Engineering, Cloud & IT Infrastructure Management, and Cybersecurity services.

Pelion

Pelion

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

McCrary Institute - Auburn University

McCrary Institute - Auburn University

The McCrary Institute seeks practical solutions to real-world problems in the areas of cyber and critical infrastructure security.

KryptoKloud

KryptoKloud

KryptoKloud offer a suite of Managed Services including Security Monitoring and Incident Response as well as a full portfolio of Compliance, Governance and Audit solutions.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

Indian Cyber Security Solutions (ICSS)

Indian Cyber Security Solutions (ICSS)

Indian Cyber Security Solutions is an Enterprise Cyber Security Platforms company offering Cyber Security & Technical Education and Compliance & Penetration Testing Services.

Tidal Cyber

Tidal Cyber

We formed Tidal for one simple reason—we believe that defenders need and deserve tools and services that make achieving the benefits of threat-informed defense practical and sustainable.

Hook Security

Hook Security

Setting a new standard in security awareness. Hook Security is a people-first company that uses psychological security training to help companies create security-aware culture.

RapidFort

RapidFort

RapidFort’s Software Attack Surface Optimization Platform remediates 95% of software vulnerabilities in minutes without code changes.