BUSINESS > Services > IT & Telecoms


« Back to News

2018-08-20

Malware – The Hateful Eight

Thesaurus Part 2: This concise malware bestiary will help you get your malware terms right when you hang out with the experts.

2018-08-16

GMail Users Warned Of Vulnerability

Confidential Mode: GMail users have been alerted about a new Google Mail feature which can be exploited to carry out a wave of scams.

2018-07-27

Deloitte's Initiative To Reduce The Gender Gap

Currently women only represent 11% of the global cybersecurity workforce, despite the big talent shortage. Deloitte have a plan to help with that.

2018-08-13

Internet Risks Failure As Sea Levels Rise

By 2033, over 4,000 miles of underground fiber will be beneath sea water and hundreds of data centers will be affected by climate change.

2018-08-09

Public Cloud Security Is A Conundrum

According to the experts at Gartner, the cloud is just like traditional forms of computing, except that everything is different.

2018-07-20

Android Abuse: EU Fines Google $5.1 Billion

The EU is taking aggressive regulatory action against the US technology giant that may cause lasting changes to the smartphone industry.

2018-07-24

Quantum Computing Is Becoming Reality

The first thing to know about quantum computing is that it won’t displace traditional, or ‘classical’ computing…Yet…

2018-07-30

What is Digital Twin Technology?

Digital Twin technology has moved beyond manufacturing and into the merging worlds of the IoT, Artificial Intelligence and Data Analytics.

2018-07-27

Why Is Rural Broadband Access A Problem?

Only 55 percent of people living in US rural areas have access to the broadband speeds that are available to 94 percent of the urban population.

2018-07-24

Hacking Via The Cloud

Chinese hackers launched a big 2017 espionage campaign targeting cloud service supplier’s networks, rather than attacking companies directly.

2018-07-13

Breakthrough Technologies To Combat Insider Threats

Advances in technology have a positive outlook on keeping sensitive data safe. Here are five emerging tools for mitigating insider threats.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

Security Audit Systems

Security Audit Systems

Security Audit Systems is a website security specialist providing website security audits and managed web security services.

Ericsson

Ericsson

Ericsson is a leading provider of telecommunications services and network infrastructure solutions including all aspects of network security.

AppSec Labs

AppSec Labs

AppSec Labs specialise in application security. Our mission is to raise awareness in the software development world to the importance of integrating software security across the development lifecycle.

Sandline Discovery

Sandline Discovery

Sandline Discovery provides digital forensics, eDiscovery solutions, managed review and litigation consulting services.

itbox.online

itbox.online

Itbox.online offers IT solutions to ensure that your company's technologies are always available and secure as your business demands.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

CyberCX

CyberCX

CyberCX provides services from strategic consulting, security testing and training to world-class managed services and engineering solutions.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

SkyePoint Decisions

SkyePoint Decisions

SkyePoint Decisions is a leading Cybersecurity Architecture and Engineering, Critical Infrastructure and Operations, and Applications Development and Maintenance IT service provider.

Crosspoint Capital Partners

Crosspoint Capital Partners

Crosspoint Capital Partners is a private equity investment firm focused on the cybersecurity and privacy sectors.

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services is a premier Managed Internet Technology (I.T.) company with a focus in cybersecurity risk management and CMMC compliance management.

Splashtop

Splashtop

Splashtop’s cloud-based, secure, and easily managed remote access solution is increasingly replacing legacy approaches such as virtual private networks.

Emantra

Emantra

Emantra specialises in the enablement of Secure Cloud services through it’s comprehensive Sovereign Cloud Hosting, Secure Access Service Edge, and managed services.

RIIG Technology

RIIG Technology

Our mission is to empower organizations with high-quality, verifiable data and advanced intelligence solutions, ensuring robust security and effective risk management.