BUSINESS > Services > IT & Telecoms


« Back to News

2016-07-28

Google Wants Your Medical Records

Google's DeepMind has moved on from playing Go to more serious matters - attempting to solve some of the world's biggest health problems.

2016-07-27

Ransomware: Should You Pay The Ransom?

Security professionals dread the day when they learn that ransomware has infiltrated their network and started encrypting files & drives.

2016-07-26

Snowden iPhone Case Alerts Users To Surveillance

Edward Snowden has helped design a mobile phone case that shows when a smartphone is transmitting information that could be monitored.

2016-07-22

Artificial Brains to Protect Against Cyberattacks

Solutions that apply machine learning to artificial intelligence are the next step in cybersecurity.

2016-07-22

Improved Security For The Internet-of-Things

Inherently Insecure: Connectivity between IoT devices is often exploited, especially when it involves in-transit data encryption. What can be done?

2016-07-22

Ransomware Victims Run Into Millions

13m Americans have been targeted by ransomware, malicious software that blocks computer access until the victim pays a sum of money.

2016-07-20

Hackers Target Thousands of GMails

Google Alert: “Government-backed hackers may be trying to steal your password,”

2016-07-19

A Strategic Company: The Internet of Things & How ARM Fits In

ARM Holdings designs mobile and low-power chips found in many IoT devices, the servers that connect them & the devices used to control them.

2016-07-14

Threat Intelligence Sharing Deals With Cybersecurity

Access to timely information and intelligence is vital in protecting organizations and firms against data breaches & security incidents.

2016-07-15

Infrastructure Security in the Age of Ransomware

Critical infrastructure including electric and water utilities are being temporarily shut down as ransomware plagues corporate systems.

2016-07-13

Air Gapping Critical Process Control Networks

Oil giant Chevron has chosen to air gap critical systems to disconnect them from the Internet as much as possible.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Centre for Secure Information Technologies (CSIT)

Centre for Secure Information Technologies (CSIT)

CSIT is a UK Innovation and Knowledge Centre (IKC) for secure information technologies. Our vision is to be a global innovation hub for cyber security.

Firebrand

Firebrand

Firebrand is the leader in Accelerated Learning in the field of IT and project management.

SiteGuarding

SiteGuarding

SiteGuarding provide website security tools and services to protect your website against malware and hacker exploits.

KayHut

KayHut

KayHut is a young, innovative company engaged in cyber research and security solutions.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

MBL Technologies

MBL Technologies

MBL Technologies specializes in information assurance, enterprise security, privacy, and program/project management.

Quadron  Cybersecurity Services

Quadron Cybersecurity Services

Quadron Cybersecurity Services is a specialist in digital security, data and system protection.

GulfTalent

GulfTalent

GulfTalent is the leading job site for professionals in the Middle East and Gulf region covering all sectors and job categories, including cybersecurity.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

ValidSoft

ValidSoft

ValidSoft is a security software company, providing telecommunications-based multi-factor authentication, identity and transaction verification technology.

ITsMine

ITsMine

ITsMine’s Beyond DLP solution is a leading Data Loss Prevention solution used by organizations to protect against internal and external threats automatically.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

Persistent Systems

Persistent Systems

Persistent Systems are a trusted Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients.

Plex IT

Plex IT

Plex IT provides managed IT services to organisations along with managed security services.

Lightpoint Global

Lightpoint Global

Lightpoint Global is a bespoke software development company. We also provide a spectrum of services such as IT consulting, business analysis, QA and testing, and DevOps services.

Hudson Rock

Hudson Rock

Hudson Rock’s products — Cavalier & Bayonet — are powered by our cybercrime database, composed of millions of machines compromised by Infostealers in global malware spreading campaigns.