BUSINESS > Services > IT & Telecoms


« Back to News

2019-11-11

Tech Giants Have Facilitated An Online Slavery Market

An undercover BBC Arabic investigation has found that domestic workers are being illegally bought and sold online in a booming black market.

2019-10-30

Google Claims Quantum Supremacy

The race to build the world's first useful quantum computer is nearing its end. Google are claiming victory over IBM. Why is that important?

2019-10-24

Happy Days Ahead For 5G Hackers

Fifth-generation mobile networks are going live with greatly improved latency & bandwidth. They also offer hackers greatly more potential for attack.

2019-10-22

Just A Normal Day At The Office For Huawei

Huawei reveals that it suffers a million cyber-attacks every day, focused on stealing aspects of its leading 5G network technology.

2019-10-22

Cybersecurity And The EU's Regime For 5G Networks

The powerful new features of 5G networking will bring numerous security challenges. A lot will depend on regulatory compliance. By Joao Paro

2019-10-11

Google Creates Video Tools To Fight Deepfakes

Google has released a database of 3,000 deepfakes to help researchers build the tools needed to take down harmful fake videos.

2019-10-10

Malware Has Increased By 64%

WatchGuard report that malware volume has increased by 64% year-on-year and increasingly targets organisations in Europe and APAC.

2019-10-08

60% Of Organisations Have Been Attacked - Some Don’t Even Know It

Hacked Off: Around 60% of global organisations have suffered a breach in the past three years. The rest feel like their turn is coming.

2019-10-07

Hackers Invade Routers To Steal Payment Card Details

IBM find evidence that hackers have created malicious scripts they can deploy on commercial-grade 'Layer 7' routers to steal card details.

2019-10-04

The Future Of Cyber Security Is AI

A growing number of experts believe that Artificial intelligence will be at the forefront of the next wave of cybersecurity tools.

2019-10-01

The WannaCry Hangover

WannaCry detections are at an all-time high and it continues to infect computers worldwide, say the security experts at Sophos.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Versasec

Versasec

Versasec is a leader in identity and access management, providing customers with security solutions for managing digital identities.

BigID

BigID

BigID is redefining personal data protection and privacy. BigID software helps companies secure their customer data & satisfy privacy regulations like GDPR.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center is a not-for-profit organization focused on regional cybersecurity excellence and readiness, with a special emphasis on the maritime community.

Bird & Bird

Bird & Bird

Bird & Bird is an international law firm with a focus on helping organisations being changed by technology and the digital world. Areas of expertise include cyber security.

TypingDNA

TypingDNA

TypingDNA uses AI to recognise people by the way they type on desktop keyboards and mobile devices.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Surefire Cyber

Surefire Cyber

Surefire Cyber delivers swift, strong response to cyber incidents such as ransomware, email compromise, malware, data theft, and other threats with end-to-end response capabilities.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

HEROIC Cybersecurity

HEROIC Cybersecurity

HEROIC’s enterprise cybersecurity services help improve overall organizational security with industry best practices and advanced technology solutions.

Kivera

Kivera

Kivera enforces your organisation governance and security policies across cloud deployments preventing misconfigurations turning into attack vectors.

Assetnote

Assetnote

The Assetnote platform enables organizations to effectively map and continuously monitor their external attack surface.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.

Averlon

Averlon

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility, Predictive Attack Intelligence and Rapid Remediation.

Invisinet Technologies

Invisinet Technologies

Invisinet is a cybersecurity technology company specializing in innovative solutions that protect network infrastructure and critical assets from advanced threats.

Kali Linux

Kali Linux

Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing.