BUSINESS > Services > IT & Telecoms


« Back to News

2018-04-11

The Cloud Is A Key To Cyber Defence

Organisations need to grasp security intelligence and act on it faster to get ahead of attackers. Cloud-based security can make that possible.

2018-04-09

Home Working Is A Threat To Cybersecurity

Forget About BYOD: Chartity sector workers should avoid taking work devices and sensitive work information home with them.

2018-04-03

Have You Gauged The Cost Of A Cloud Outage?

Many organisations have not fully evaluated the cost of a cloud outage to their business and are ill prepared to deal with the impact of an outage.

2018-03-27

Five Steps To Keeping Your Cloud GDPR Compliant

The GDPR gives the balance of power concerning personal data to the individual rather than companies collecting it. That could be painful.

2018-03-23

Russia Can Disconnect From The Internet

Russia has prepared the infrastructure to support a digitally isolated state, capable of operating independently from the World Wide Web.

2018-03-23

About Strategic Threat Intelligence

Threat Intelligence informs you about potential malicious activity and helps you make better decisions about prevention of damaging attacks.

2018-03-19

Ensure Your Cloud Storage Is Compliant With GDPR

Its not just EU organisations: If your website captures visitors’ IP addresses and you have five a year from European countries, GDPR affects you.

2018-03-07

Which Phishing Messages Have A Near 100% Click Rate?

Training employees to spot phishing emails, messages and phone calls needs to be frequent if the organisation wants to see click rates decrease.

2018-03-02

Blockchain & Cryptocurrency May Soon Underpin Cloud Storage

Decentralised storage platforms using blockchain technology see an opportunity to compete with the Cloud big boys like AWS and Microsoft's Azure.

2018-02-26

FBI, CIA & NSA Officials Agree: Stay Away From Huawei Phones

Without disclosing hard evidence, the US intelligence establishment are united in accusing the Chinese telecoms giant of cyber espionage.

2018-02-23

Cybersecurity Is A Job for CEOs, Not Just The IT Team

Cyber attacks on business pose real dangers to the bottom line and corporate reputation. They must be dealt with first-hand in the boardroom.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

RU-CERT

RU-CERT

RU-CERT is the CSIRT / CERT team of the Russian Federation.

CERT.LV

CERT.LV

CERT.LV is the national Computer Emergency Response Team for Latvia.

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

Secardeo

Secardeo

Secardeo is a provider of corporate solutions using digital signatures and certificates. Our solutions enable the user transparent end-to-end encryption of e-mails between organizations.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Open Connectivity Foundation (OCF)

Open Connectivity Foundation (OCF)

OCF is dedicated to ensuring secure interoperability ensuring secure interoperability of IoT for consumers, businesses and industries.

Sigma IT

Sigma IT

SIGMA IT is one of the largest IT services organizations in EMEA region providing a full range of solutions and services including cybersecurity, data protection and business continuity.

Infopercept Consulting

Infopercept Consulting

Infopercept is a leading cybersecurity company in India, providing a critical layer of security to protect business information, infrastructure & assets across the organization.

Constella Intelligence

Constella Intelligence

Constella Intelligence provides digital risk protection services to quickly and efficiently disrupt cyber attacks and data breaches before they occur.

Maxxsure

Maxxsure

Maxxsure provides a platform for executive management, leveraging proprietary technology that identifies, measures, and scores a company’s cyber risks.

Toka Group

Toka Group

Toka empowers government agencies with critical and previously out-of-reach digital forensics, force protection and Intelligence capabilities, tackling the fields' most pressing challenges.

Iconium Software

Iconium Software

DataLenz by Iconium offers continuous and real-time tracking of your data assets delivering you the tools you need to successfully reach and maintain your target security standards.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

Anura

Anura

The world’s most accurate ad fraud solution protects your web assets by eliminating bots, malware and human fraud, ensuring your content is seen by real people.

Telarus

Telarus

Telarus is a Technology Services Brokerage that holds contracts with the world's leading cloud voice, contact center, cybersecurity, mobility and IoT providers.

LEPHISH

LEPHISH

LePhish is a French cybersecurity solution specializing in automated phishing campaigns.