BUSINESS > Services > IT & Telecoms


« Back to News

2018-03-07

Which Phishing Messages Have A Near 100% Click Rate?

Training employees to spot phishing emails, messages and phone calls needs to be frequent if the organisation wants to see click rates decrease.

2018-03-02

Blockchain & Cryptocurrency May Soon Underpin Cloud Storage

Decentralised storage platforms using blockchain technology see an opportunity to compete with the Cloud big boys like AWS and Microsoft's Azure.

2018-02-26

FBI, CIA & NSA Officials Agree: Stay Away From Huawei Phones

Without disclosing hard evidence, the US intelligence establishment are united in accusing the Chinese telecoms giant of cyber espionage.

2018-02-23

Cybersecurity Is A Job for CEOs, Not Just The IT Team

Cyber attacks on business pose real dangers to the bottom line and corporate reputation. They must be dealt with first-hand in the boardroom.

2018-02-15

What is the Industrial IoT?

The IIOT connects machines and devices in industries across transportation, power and healthcare. The potential is high and so are the risks.

2018-02-06

Alphabet Launches A Cybersecurity Company - Chronicle

Alphabet, the parent company of Google, Nest, Waymo, and many other companies, is launching a cybersecurity startup.

2018-01-29

Get Serious About Hardware Cybersecurity

Meltdown and Spectre highlight the need to defend against vulnerabilities in embedded hardware for critical infrastructure.

2018-01-18

Cyber Attacks Will Continue to Succeed

Spectre and Meltdown demonstrate weaknesses in current hardware cybersecurity that will force a paradigm shift within the semiconductor industry.

2018-01-16

Inside the Intel Chip Security Problem

Technology companies are still scrambling to fix serious security flaws affecting computer processors built by Intel and other chipmakers.

2018-01-11

Smartphone Password Vulnerability Discovered

The sensors that make your mobile device smart can also render it vulnerable.

2018-01-05

UK Cybersecurity Firm Sophos Is Trouncing Silicon Valley

Shares in Sophos have more than doubled in price in the last year, outpacing well-known US rivals. What is going on?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DataGuidance

DataGuidance

DataGuidance is a platform used by privacy professionals to monitor regulatory developments, mitigate risk and achieve global compliance.

Opengear

Opengear

Opengear ensures network resilience to enterprises by enabling business continuity with the Network Resilience Platform.

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

National Digital Exploitation Centre (NDEC) - United Kingdom

National Digital Exploitation Centre (NDEC) - United Kingdom

NDEC is a project to create a centre of cyber and digital development and education for the UK. It will offer training in digital practices, cyber security and research.

SecureMe2

SecureMe2

SecureMe2 ‘s mission is to make organizations more responsive to digital threats by deploying smart technology in a highly accessible way.

Norma Inc.

Norma Inc.

Norma provides the secured wireless environment (WiFi and Bluetooth) with the unauthorized AP detection, and secures your IoT assets from various threats.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

Interos

Interos

Interos is the operational resilience company — reinventing how companies manage their supply chains and business relationships — through a breakthrough AI SaaS platform.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

Cognna

Cognna

Cognna's innovative platform is designed to empower you and your team, providing the tools you need to detect, prevent, and resolve threats with ease.

Oxylabs

Oxylabs

Oxylabs is the largest datacenter proxy pool in the market, with over 2 million proxies. Designed for high-traffic, fast web data gathering while ensuring superior performance.

Armata Cyber Security

Armata Cyber Security

Armata exists to bring Cyber Security to all people – from home users and SMBs to large enterprises. We believe all users have the right to an affordable yet effective Cyber Security solution.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.

CloudBees

CloudBees

CloudBees is building the world’s first end-to-end automated software delivery system, enabling companies to balance governance and developer freedom.

Relyance AI

Relyance AI

Relyance AI - One unified platform for privacy, security, & governance.

Lumos

Lumos

Lumos, the Unified Access Platform to manage all access to apps and data.