BUSINESS > Services > IT & Telecoms


« Back to News

2017-09-21

Get Your Data Strategy On Board

Only 32% of UK organisations plan to significantly invest in data and analytics in 2017, according to new research by DataIQ Leaders.

2017-10-03

In The House Or In The Cloud: Which Is More Secure?

There are many reasons to deliberate carefully before choosing an in-house or cloud service delivery model.

2017-10-02

Big Data - Big Changes Coming

There is one hurdle to the rapid growth of data; the shortage of highly skilled individuals who can analyse and crunch the data to make it valuable.

2017-09-29

Put Your Physical Security Into The Cloud

The cloud revolution has the potential to change every aspect of physical security, offering ways of doing things that never existed before.

2017-09-16

Facebook T0 Spend $1b On VideoProduction

Facebook plans to invest $1 billion to fund original content initiatives for its new Watch video platform aimed at competing with Apple.

2017-09-26

IT Jobs Are Bound For Extinction

Top Tech jobs, even some of today’s hottest, like developers and data scientists,could one day find themselves on the digital scrap heap.

2017-09-22

New Gigabit UK Broadband Trial

6 Areas in the UK will soon be trying out broadband technology that provides data at speeds approaching one gigabit per second (Gbps).

2017-09-18

S. Africa’s Model For Cybesecurity

S. African organisations can no longer afford to operate in isolation in the process era of the 4th Industrial Revolution.

2017-09-07

‘Decoys’ To Reinforce Japan’s Defenses Against Cyber-attacks

As regional tensions deepen, Japan’s Communications Ministry is creating decoy computer systems to combat cyber-attacks,

2017-09-06

4 Ways to Simplify Your Business Data Management

Enterprise IT managers have more data to manage than ever. Is your business trying to to manage data growth without scaling the budget?

2017-09-05

Russian Hackers Feel The Heat

Used to operating with impunity, Russian cyber criminals are getting worried that US prosecutions will lead to further arrests and close them down.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Qualitèsoft Technology

Qualitèsoft Technology

Qualitèsoft Technology is a leading Software Development and Quality Assurance organization. We specialize in Custom Development, Mobile Application, Software Testing and Quality Assurance.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets is a global series of summits focusing on cyber security for critical infrastructure.

Prevalent

Prevalent

Prevalent takes the pain out of third-party risk management. Companies use our services to eliminate the security and compliance exposures that come from working with vendors and suppliers.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

Cyscale

Cyscale

Cyscale automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Crypsis

Crypsis

Crypsis was built based on a shared vision of creating a more secure digital world by providing the highest quality incident response, risk management, and digital forensic services.

Kiuwan

Kiuwan

Kiuwan provide software security solutions with SAST and SCA source-code analysis that fit into your DevOps process.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

ProcessUnity

ProcessUnity

ProcessUnity is a leading provider of Third-Party Risk Management software, helping companies remediate risks posed by third-party service providers.

Enso Security

Enso Security

Enso is the first Application Security Posture Management (ASPM) solution, helping security teams everywhere eliminate their AppSec chaos with application discovery, classification and management.

Ciphertex Data Security

Ciphertex Data Security

Ciphertex is a leading data security company that specializes in portable data encryption and privacy protection storage systems.

Debevoise & Plimpton

Debevoise & Plimpton

Debevoise & Plimpton LLP is a premier law firm with market-leading practices in areas including Data Strategy & Security.

Imprivata

Imprivata

Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges.

Fulcrum IT Partners

Fulcrum IT Partners

Fulcrum IT Partners is the parent company of an expanding portfolio of established IT solution companies around the world with proven expertise in cyber security, cloud, and managed services.

TrustNet

TrustNet

TrustNet helps mid-to-large firms build trust through top-tier cybersecurity, compliance, and consulting—offering complete managed services all in one place.