BUSINESS > Services > IT & Telecoms


« Back to News

2016-11-10

Google’s Ad Tracking Is Just As Creepy As Facebook's

Google has changed the way it tracks its users across the internet, merging users' personal identity data across Gmail, YouTube without consent.

2016-10-31

Data Strategies Are Not Keeping Up With Cloud Migration

Enterprise data protection strategies might not be fully aligned with IT modernization initiatives driven by cloud computing.

2016-11-07

So Far In 2016 Data Breaches Are Up 20%

The US Identity Theft Resource Center (ITRC) reports 783 data breaches recorded and more than 29 million records exposed so far this year.

2016-10-24

New Virus Attacks All Windows-Based Computers

A new type of malware capable of running on every version of MS Windows that can be detected by only two anti-virus engines.

2016-10-06

Yahoo Secretly Scanned Emails For US Intelligence

Last year Yahoo secretly built a custom software program to search all incoming emails for specific information provided by US intelligence agents.

2016-10-05

Something To Hide? Apple Will Share Your iMessages With The Police

Apple promises that your iMessage conversations are safe and out of reach from anyone other than you and your friends. Really?

2016-10-12

Strategies For A Culture of Cyber-Security

Information security can be an overwhelming concept to grasp, but it's vital to protecting your sensitive business data.

2016-10-05

Five Technologies Changing Our lives In Five Years

Analysts say a handful of technologies are poised to change our lives by 2021. What are they?

2016-10-05

Ever-Evolving Trojan Devices Infects Android Systems

The Trojan known as Android.Xiny continues to evolve and has gained the ability to infect a core Android system process.

2016-09-30

More Questions About The Yahoo Breach

Pressure is mounting on Yahoo to admit when it knew about the attack, & whether there was a delay in reporting it.

2016-09-30

An Historic AI Partnership

The world’s largest technology companies hold the keys to some of the largest databases on our planet. Is that really healthy for society?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Prim'X Technologies

Prim'X Technologies

Prim'X Technologies provides information protection solutions to prevent unauthorised access to sensitive data.

LEXFO

LEXFO

LEXFO specializes in the security of information systems, assisting clients in protecting information assets using an offensive and innovative approach.

Quaynote Communications

Quaynote Communications

Quaynote Communications is a specialist conference and communications company focused primarily on the maritime, yachting, aviation and security industries.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

Codeproof Technologies

Codeproof Technologies

The Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more.

Czech Accreditation Institute

Czech Accreditation Institute

Czech Accreditation Institute is the national accreditation body for the Czech Republic. The directory of members provides details of organisations offering certification services for ISO 27001.

ProSearch Partners

ProSearch Partners

ProSearch Partners are national talent acquisition specialists exclusively focussing on Technology and Digital talent including Cybersecurity, Data Analytics and Execs.

EBRAND Services

EBRAND Services

EBRAND, the European experts for brand protection on the Internet. We offer a full set of services including cybermonitoring, fighting counterfeiting offences and online security.

Sectra Communications

Sectra Communications

Sectra successfully develops and sells cutting-edge solutions in the expanding niche segments of medical IT and cybersecurity.

Cyber Dacians

Cyber Dacians

Cyber Dacians offers Information and Cyber Security Consulting Services. We help you to test the effectiveness of your security defenses and build a secure infrastructure.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

Comcast Business

Comcast Business

Comcast Business keeps businesses ready for what’s next with powerful connectivity, advanced cybersecurity solutions, and the right people at your side.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

Xperience

Xperience

Xperience solves our clients’ toughest challenges by delivering business efficiency through digital transformation solutions across cloud, managed IT, CRM and ERP.

ZEUSS

ZEUSS

ZEUSS is a diversified data center, cybersecurity, and green energy company.

Gogolook

Gogolook

Gogolook is a leading TrustTech company. With "Build for Trust" as its core value, it aims to create an AI- and data-driven global anti-fraud network as well as Risk Management as a Service.