BUSINESS > Services > IT & Telecoms


« Back to News

2017-10-19

Facebook's Algorithm And Russian Ads

The algorithms have done their job, but criticism of Facebook's handling of racist content, fake news and malicious electoral influence are growing.

2017-10-03

Deloitte Hit by Cyber Attack: Clients' Private Data Exposed

The hacker compromised the firm’s global email server through an “administrator’s account” giving them privileged, unrestricted “access to all areas”.

2017-10-18

What Is Edge Computing?

Edge Computing allows data produced by IoT devices to be processed close to where it is created, instead of sent to data centres or the cloud.

2017-10-13

Wanted: A New Microchip For The AI Era

The coming AI revolution faces a big hurdle: today’s microchips as conventional chip design reaches its limits.

2017-10-11

Kaspersky Says We Can Trust Him

Eugene Kaspersky denies that firm he founded is too close to the Russian government and insists it poses no danger to its American customers.

2017-10-10

Transforming Your Database

The love affair with the big matrix of bits is slowly fading as developers are realizing that not everything fits into a simple table.

2017-10-09

A 9-Step Guide For GDPR Compliance

In May 2018, the General Data Privacy Regulation will take effect, significantly altering the way organisations handle and store data. Be prepared.

2017-09-21

Get Your Data Strategy On Board

Only 32% of UK organisations plan to significantly invest in data and analytics in 2017, according to new research by DataIQ Leaders.

2017-10-03

In The House Or In The Cloud: Which Is More Secure?

There are many reasons to deliberate carefully before choosing an in-house or cloud service delivery model.

2017-10-02

Big Data - Big Changes Coming

There is one hurdle to the rapid growth of data; the shortage of highly skilled individuals who can analyse and crunch the data to make it valuable.

2017-09-29

Put Your Physical Security Into The Cloud

The cloud revolution has the potential to change every aspect of physical security, offering ways of doing things that never existed before.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

Internet Security Alliance (ISA)

Internet Security Alliance (ISA)

ISA is an international trade association providing thought leadership in advancing a sustainable system of cyber security.

Willis Towers Watson

Willis Towers Watson

Willis Towers Watson is a global risk management, insurance brokerage and advisory company. Services offered include Cyber Risks insurance.

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

PRODAFT

PRODAFT

PRODAFT, Proactive Defense Against Future Threats, is a cyber security and cyber intelligence company providing solutions to commercial customers and government institutions.

ISEC7 Group

ISEC7 Group

ISEC7 Group is a global provider of mobile business services and software solutions. The company was one of the first movers in mobilising company and business processes.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

Ordr

Ordr

Ordr Systems Control Engine. The first actionable AI-based systems control engine for the hyper-connected enterprise. You’re in control.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

PhishProtection

PhishProtection

We created Phish Protection to prevent all types of phishing including spear phishing protection and office 365 email protection for your small business.

Dimension Data

Dimension Data

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including intelligent security solutions.

Qeros

Qeros

Qeros is a next-generation distributed system enables secure data and transaction processing at the velocity of thought.

SecureClaw

SecureClaw

SecureClaw offers specialized cybersecurity consultation, various products, and a range of services to meet your company's business domain needs.

Opal Security

Opal Security

Opal is an identity and access management platform that offers a consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS.

Permiso Security

Permiso Security

Permiso combines industry leading Identity Security Posture Management with Identity Threat Detection and Response, leaving no place to hide for identity threats lurking in your environment.