BUSINESS > Services > IT & Telecoms


« Back to News

2017-08-02

Room At The Top For Women In Tech

It is possible for the tech industry, including data and analytics, to increase the number of C-suite women, even starting from a low base?

2017-08-10

Who Is Responsible for Cloud Security?

IT pros want to apply the same level of security to their cloud deployments as to internal resource and true cloud security requires a collaborative effort.

2017-08-11

Dangers Of Betting On Hybrid Cloud

Hybrid cloud’s popularity might prove to be a transitional stage, distracting companies from properly implementing data security.

2017-08-08

88% Feel Vulnerable To Data Threats

Organisations are increasingly aware of the threat posed by data breaches, according to Thales’ 2017 Data Threat Report.

2017-08-04

5G Wireless Technology - Enabling Mobile-Only Networking

5G is about the evolution of cellular from wireline augmentation to wireline replacement, and strategically from mobile-first to mobile-only.

2017-08-03

Microsoft Cloud Earnings Beat Expectations

There's a reason Microsoft founder Bill Gates is still the richest man in the world and it's not because of PCs & software. It's all about the Cloud.

2017-07-31

IoT Is Becoming A Nightmare For IT

The Internet of Things, at its simplest level, is about connecting smart devices but it is far from a simple challenge for IT departments.

2017-07-28

UK National Cyber Security Centre Has Not Certified Kaspersky

Revealed: Britain's National Cyber Security Centre has never certified products from Russian cybersecurity firm Kaspersky Lab.

2017-07-28

Cybersecurity Is More Difficult Than 2 Years Ago

Over 70 percent of cybersecurity and IT professionals believe cybersecurity analytics and operations are more difficult now. What are the reasons?

2017-07-25

Can We Stop Algorithms Telling Lies?

Most important moments where people interact with large bureaucratic systems involve an algorithm in the form of a scoring system. That's a problem.

2017-07-24

Google Wants To Mimic The Human Brain

Google is proposing a template for creating a single machine learning model that can address multiple tasks, emulating human intelligence.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Aeriandi

Aeriandi

Aeriandi is a leading provider of hosted PCI security compliance solutions for call centres, trusted by high street banks and major Telcos.

Vicarius

Vicarius

Vicarius’ mission is to revolutionize vulnerability management from problem detection to proactive problem resolution.

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

Argo Group

Argo Group

Argo is an international underwriter of specialty insurance. Argo Cyber offers a full spectrum of coverage solutions related to professional and technology services.

oneclick

oneclick

oneclick is a central access and distribution platform in the cloud, enabling the management of the entire technology stack for application provisioning.

Internet Crime Complaint Center (IC3)

Internet Crime Complaint Center (IC3)

The Internet Crime Complaint Center provide the public with a reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity.

Redhorse

Redhorse

Redhorse provides top-tier consulting to help clients address mission-critical government problems in National Security, Networking Technology, Energy and the Environment.

Periculus

Periculus

Periculus makes managing digital risk simple. Its integrated platform offers access to purchase cyber insurance and cyber security solutions uniquely tailored to fit the needs of every business.

Data#3 Limited (DTL)

Data#3 Limited (DTL)

Data#3 Limited (DTL) is a leading Australian IT services and solutions provider.

KirkpatrickPrice

KirkpatrickPrice

KirkpatrickPrice is dedicated to providing you with innovative security guidance and efficient audit services.

Alibaba Cloud

Alibaba Cloud

Alibaba Cloud is committed to safeguarding the cloud security for every business by leveraging a comprehensive suite of enterprise security services and products on the platform.

Trellix

Trellix

Trellix is an extended detection and response (XDR) solutions provider created from a merger of McAfee Enterprise and FireEye Products.

ThreatNG Security

ThreatNG Security

ThreatNG is redefining external attack surface management (EASM) and digital risk protection with a platform of unmatched breadth, depth, and capabilities in thwarting technical and business threats.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

Merlin Ventures

Merlin Ventures

Merlin Ventures is a strategic investor focused on driving growth and value for cybersecurity software companies with market-leading potential.

BeckTek

BeckTek

BeckTek specialize in IT Cyber Security & Support, helping clients run their businesses faster, easier and more profitably.