BUSINESS > Services > IT & Telecoms


« Back to News

2017-12-18

Russia Will Build A Separate Internet Directory

The Russian government plans to build an “independent internet” for BRIC nations as an alternative to the global Domain Name System .

2017-12-18

Undersea Telecoms Cables Are Interception Targets

Undersea cables carrying vital data are essential to modern communications but lack both physical and legal protections. That's a problem.

2017-12-14

Botnets Are Here To Stay

Botnets work by infecting connected devices with malware, then managing them using a command and control server. The results can be devastating.

2017-12-12

Cisco & INTERPOL: Working Against Cybercrime

INTERPOL and IT giant Cisco agree to share data for quick threat detection worldwide and prepare for potential future collaboration in training.

2017-12-05

Cybersecurity Firms Deploy AI Against Hackers

AI can detect threats at an early stage before too much damage has been done and there is no need for humans to defend networks from many attacks.

2017-11-29

Apple Must Fix Its Embarrassing Password Bug

A security researcher has uncovered a bug in Apple macOS High Sierra so remarkably simple, it is described as a "howler" and "embarrassing".

2017-11-27

Who's Responsible For Cloud Security?

While the cloud brings benefits, security remains a particular area of concern for US government agencies and it’s not always clear who’s in charge.

2017-11-17

DDoS Attack? There Is An App For That.

Security expert Brian Krebs tells the story of Ragebooter, a Denial of Service App that is readily available to Android users.

2017-11-15

US Data Systems Under Attack

US Homeland Security issue a warning that the nuclear, energy, aviation, water and critical manufacturing industries are targeted by hackers.

2017-11-10

Tech Giants Face US Congress Over Russia Election

A showdown between Congress and the powerful social media companies that have helped define the current unsettled age in western democracies.

2017-11-13

All WiFi Networks Are Vulnerable to Hacking

The security protocol protecting the vast majority of WiFi connections has been broken, exposing wireless Internet traffic to eavesdroppers.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

Rambus Security Division

Rambus Security Division

Rambus Security Division solutions span areas including tamper resistance, content protection, network security, mobile payment, smart ticketing, and trusted provisioning services.

Guardtime

Guardtime

Guardtime's Black Lantern platform provides real-time cybersecurity and data-centric asset protection.

Industrial Cyber-Physical Systems Center (iCyPhy)

Industrial Cyber-Physical Systems Center (iCyPhy)

The goal of iCyPhy is to conduct pre-competitive research on architectures and design, modeling, and analysis techniques for cyber-physical systems.

National Institute of Information and Communications Technology (NICT)

National Institute of Information and Communications Technology (NICT)

NICT is Japan’s sole National Research and Development Agency specializing in the field of information and communications technology.

Gradiant

Gradiant

Gradiant’s mission is to contribute to the growth and competitive improvement of Galician businesses through technology development and innovation using ICT.

EMnify

EMnify

EMnify is a Software-as-a-Service (SaaS) company, revolutionizing cellular Internet of Things (IoT).

White Bullet

White Bullet

White Bullet’s risk profiling AI detects, dynamically scores and flags unsafe domains, apps and advertising.

Littlefish

Littlefish

Littlefish provide world-class, award-winning Managed IT and Cyber Security Services, delivered from our 24/7 UK service centres.

SecurelyShare Software

SecurelyShare Software

SecurelyShare Software is a security software company, specializing in data security, data privacy and data governance.

Cybertronium

Cybertronium

Cybertronium is a leader in managing cyber risk. We bring you the latest from the complex, ever-evolving online threat environment with the insights to inspire and the expertise to act.

ICS

ICS

ICS is a leading provider of outsourced IT services, cybersecurity, communications, and distributed workforce solutions throughout the US.

Zokyo

Zokyo

Zokyo is a venture studio that builds, secures, and funds legendary web3/crypto businesses.

Aptum

Aptum

Aptum is a global hybrid multi-cloud managed service provider delivering complex and high-performance cloud solutions with an integrated secure network.

Druva

Druva

Druva is the industry’s leading SaaS platform for data resiliency, and the only vendor to ensure data protection across the most common data risks backed by a $10m guarantee.

CyberSecureRIA

CyberSecureRIA

We founded CyberSecureRIA specifically to secure and support RIAs. We exist to secure SEC-registered RIAs, and keep them compliant with cybersecurity regulations.