BUSINESS > Services > IT & Telecoms


« Back to News

2017-03-17

Data Realities: 2017 & Beyond

Data Matters: A critical driving force in the global economy will be data exploitation, data value creation, data-sharing & data protection.

2017-03-17

Google's New AI System Unscrambles Pixelated Faces

Google reveals a new AI system capable of “enhancing” an eight-pixel square image, increasing the resolution x 16-fold to restore lost data.

2017-02-28

Tech Companies Oppose Trump’s Travel Ban

SpaceX and Tesla are the latest to join the ranks of technology firms officially opposing the migrant ban imposed by the President Trump

2017-03-01

Fake Microsoft Phishing Scam

Access to your Microsoft Email Account Disabled? A campaign of fraudulent messages designed to capture your online identity via a fake website.

2017-02-10

Yahoo Spins A Cautionary Tale Dealing With Data Privacy

Why did it take so long for the Yahoo! hack to come to light? Opinion by Emily Taylor & Joyce Hakmeh

2017-02-21

Female Role Models & The Early Days Of Computing

EDSAC was one of the first computers, developed to undertake complex astronomical calculations. And one of the first users was Dr. Jilly Wheeler.

2017-02-21

The Cyber Security Landscape: A Frightening Picture

The experts at the Institute for Critical Infrastructure Technology paint a frightening picture of the information security landscape.

2017-02-20

Is There A Truly Secure Messaging App?

More messaging apps than ever support end-to-end encryption. Should they prioritize convenience or security?

2017-02-18

Old IT Networks Stop New IoT Innovation

The Internet of Things (IoT) isn’t all brand-new, cutting-edge technology. In fact, some of it’s already suffering through painful upgrade cycles.

2017-02-16

Browser Autofill Can Be Used To Steal Data

Your browser or password manager’s autofill might be giving away your information to phishers using hidden text boxes on websites.

2017-02-14

Non-Secure IoT Devices Are Powerful Weapons

The experts at ICIT think the future of IoT devices needs to be secured by designing in and embedding security features from the bottom up.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

National Cyber Directorate Israel

National Cyber Directorate Israel

The Israeli National Cyber Directorate provides incident handling services for civilian entities and critical infrastructures and works to increase national resilience against cyber threats.

Resource Centre for Cyber Forensics (RCCF)

Resource Centre for Cyber Forensics (RCCF)

RCCF is a pioneering institute, pursuing research activities in the area of Cyber Forensics.

4N6

4N6

4N6 is a privately-owned firm founded with the goal of providing expert knowledge of computer forensics.

SK IT Cyber Security

SK IT Cyber Security

SK IT provide services and solutions for cybersecurity and advanced information system engineering.

Lepide

Lepide

LepideAuditor is a powerful Data Security Platform that enables you to reduce risk, prevent data breaches and prove regulatory compliance.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

Pentest Limited

Pentest Limited

Pentest Limited provide information security consultation, penetration testing & red teaming services to companies across the globe.

QuoIntelligence

QuoIntelligence

QuoIntelligence experts can help your team understand the evolving cyber threats and provide simple yet comprehensive recommendations so you can focus on what matters.

ServerScan

ServerScan

ServerScan specializes in providing server scanning & compliance services to organizations of all types and sizes.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

ArmorCode

ArmorCode

ArmorCode's intelligent application security platform gives us unified visibility into AppSec postures and automates complex DevSecOps workflows.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

Kobalt.io

Kobalt.io

Kobalt are bringing the monitoring capabilities of enterprise-class security teams to smaller organizations.

American Technology Services (ATS)

American Technology Services (ATS)

American Technology Services provides unparalleled services in information technology to support small and mid-sized business. From top-level strategy, to managed services and infrastructure support.

Mediatech

Mediatech

Mediatech, specialized in managed Cybersecurity and Cloud services, a single point of contact for your company's IT and infrastructure.

SecuCenter

SecuCenter

Secucenter is a trusted partner for SOC services, offering security expertise in a cost-effective way.