BUSINESS > Services > IT & Telecoms


« Back to News

2016-08-25

Too Much Information: Making Sense Of Big Data

The abundance of information online and across our devices can overwhelm even the most technically savvy individuals.

2016-08-19

Google Uses AI To Save On It’s Energy Bills

Its artificial intelligence division, DeepMind, has cut Google's data centres' energy consumption by 15%, using a machine-learning algorithm.

2016-08-19

CISOs Need Teamwork & A Strategic Framework

Companies may not fully understand the nature of modern threats. Simply placing a higher priority on security may not lead to improved measures.

2016-08-17

Israeli Business Expands Its Cyber Footprint

Israel Aerospace Industries (IAI) is making big strides growing its cybersecurity business.

2016-08-18

Turning Big Data into Smart Data

Big Data has become one of the key buzzwords for businesses everywhere. But Without structure any amount of data is unusable.

2016-08-16

What Makes A Data Scientist?

What does it take to have a brilliant career in the hottest sector in the technology industry? It all starts with mathematics....

2016-08-15

James Bond - Pen Tester

Pen-testing can use deception to counter spear-phishing and other superficially benign threats.

2016-08-15

5 Reasons IT Leaders Should ImproveTechnical & ‘Soft’ Skills

The ability to communicate technical information to a non-technical audience is increasingly important as IT integrates with overall business functions.

2016-08-08

Bio-Electronics: A New Business Controlling Human Organs With Electronic Implants

Google & GSK invest £540m in creating automated bio- electronic nerve implants to fix defects in human tissue.

2016-08-01

Network SecurityAnd The Importance Of “Defense in Depth”

IT departments have the constant dilemna of whether it is more important to prioritize securing the network, or their endpoints.

2016-07-27

The Future Of Big Data Science

Apache Spark: An open source tool is opening up big possibilities for Data Science

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

IDnext

IDnext

IDnext is the open and independent platform to support innovative approaches in the world of the Digital identity.

Cybercrypt

Cybercrypt

Cybercrypt is a world leading system provider in robust cryptography. Protecting critical assets, applications and sensitive data.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

Carson & SAINT

Carson & SAINT

Carson & SAINT is an award-winning consulting firm with deep experience in cybersecurity technology, software, and management consulting.

Global Cyber Alliance (GCA)

Global Cyber Alliance (GCA)

Global Cyber Alliance is an international, cross-sector effort dedicated to eradicating cyber risk and improving our connected world.

RIGCERT

RIGCERT

RIGCERT provides training, audit and certification services for multiple fields including Information Security.

Jobsora

Jobsora

Jobsora is an innovative job search platform in the UK and more than 35 other countries around the world. Sectors covered include IT and cybersecurity.

Cyber NYC

Cyber NYC

Cyber NYC is a suite of strategic investments to grow New York City’s cybersecurity workforce, help companies drive innovation, and build networks and community spaces.

Ethyca

Ethyca

Ethyca builds automated data privacy infrastructure and tools for developers and privacy teams to easily build products that comply with GDPR, CCPA Privacy Regulations.

ChaosSearch

ChaosSearch

ChaosSearch is a massively scalable ELK-compatible log analysis platform delivered as a fully managed service with high-performance and low cost.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

Oxylabs

Oxylabs

Oxylabs is the largest datacenter proxy pool in the market, with over 2 million proxies. Designed for high-traffic, fast web data gathering while ensuring superior performance.

Treacle Technologies

Treacle Technologies

Treacle Technologies are a Cyber Security startup with a focus on Defensive Security.

AuthX

AuthX

AuthX provides secure and seamless log-in capabilities through strong authentication and integrations.

SecureCyber

SecureCyber

Secure Cyber Defense offers industry-leading technology and managed detection and response solutions.