BUSINESS > Services > IT & Telecoms


« Back to News

2020-11-07

How to Transition From Remote Work To A Secure & Agile Workforce

The sharp transition to remote working has huge challenges, related to data security, workstation access & organization compliance. By Mary Bird.

2020-11-03

New Software Makes Data From Multiple Sources Readable

Using advanced geospatial intelligence, the software enables rapid discovery, exploitation, and dissemination of mission-critical geospatial data.

2020-10-27

Anticipating Cyber Attacks

Cyber security teams need to shift their focus inside the network and implement tools that help detect cyber attacks as early as possible.

2020-10-21

IBM Restructures To Concentrate On The Cloud

The battle to dominate cloud computing services is growing as IBM reorganises its business in pursuit of Amazon's AWS and Microsoft's Azure.

2020-10-15

Lockdown: Half Of Organisations Are Having Cyber Security Problems

Since Lockdown work has changed significantly and in future businesses must choose whether work will be remote, in offices or a combination.

2020-10-13

The Software Industry Delivers Appliances With Known Vulnerabilities

Software vendors often distribute their products on virtual appliances with exploitable vulnerabilities running on outdated operating systems.

2020-10-13

Technology Trends to Watch Out For

The pace of technical innovation is speeding up and Gartner have highlighted the key trends that will challenge security professionals the most.

2020-10-05

British Spies Find Big Software Problems With Huawei

GCHQ's investigation of Huawei equipment widely used in the UK's telecoms networks has discovered a "nationally significant" vulnerability.

2020-09-29

BT Dumps Huawei For Nokia 5G

Nokia has signed a 5G deal with British Telecom and is set to become a major beneficiary of Huawei being blocked from the UK's 5G networks.

2020-10-01

Is Slack Secure For Your Business?

Slack is a popular productivity tool used as a communal discussion platform for many business employees. But is it really secure?

2020-09-30

What You Need to Know About 5G

5G Networks are the new generation of mobile internet connectivity on smartphones and other devices. What difference will 5G make to our lives?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

Cyjax

Cyjax

Cyjax monitors the Internet to identify the digital risks to your organisation, including cyber threats, reputational risks and the Darknet.

HCC Embedded

HCC Embedded

HCC’s mission is to ensure that data stored or communicated by an embedded IoT application is secure, safe and reliable.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

Rede Nacional CSIRT

Rede Nacional CSIRT

Rede Nacional CSIRT is a national network of CSIRTs in Portugal aimed at cooperation and mutual assistance in the handling of incidents and in the sharing of good security practices.

CerraCap Ventures

CerraCap Ventures

CerraCap Ventures invest globally into early-stage B2B companies in Healthcare, Enterprise AI and Cyber Security.

Tactic Labs

Tactic Labs

Tactic Labs (part of the Avnon Group) delivers a holistic Cyber-Security Management Platform which provides military-grade protection, safeguarding critical infrastructures and mission-critical data.

HACKNER Security Intelligence

HACKNER Security Intelligence

HACKNER Security Intelligence is an independent security consultancy delivering comprehensive security assessments across IT security, physical security, and social engineering.

Grove Group

Grove Group

Grove provides businesses with the tools that work best for their unique operations, through cybersecurity and cloud services, custom software development and our big data analytics expertise.

SolidRun

SolidRun

SolidRun is a leading provider of computing and network technology designed to streamline the deployment of edge computing infrastructure and support embedded and IoT markets.

SYN Ventures

SYN Ventures

SYN Ventures invests in disruptive, transformational solutions that reduce technology risk.

endpointX

endpointX

endpointX is a preventative cyber security company. We help companies minimize their risk of breach by improving cyber hygiene.

Xiphera

Xiphera

Xiphera designs and implements proven cryptographic security for embedded systems.

TrueDeploy

TrueDeploy

Making Software Security EASY. The Security Status of Your Software in One Place. All you have to do is Deploy.