BUSINESS > Services > IT & Telecoms


« Back to News

2016-08-30

Businesses Need To Protect Data, Not Just Devices

Companies are moving away from platform-specific endpoint security technologies toward securing their applications & data everywhere.

2016-08-30

Over 50% Data Breaches Are Due To Human Error

Cyber-fraud is malicious while a breach caused by user ignorance is not.Their organisational consequence can be equally severe.

2016-08-29

The Hidden Costs Of A Data Breach

Strengthening defenses against cyber-attackers is important. Companies must also prepare for reputational & financial damage lasting for years.

2016-08-26

Artificial Intelligence Has Finally Emerged Into Real Life

Robotics is about embedding rules into a technological process. AI is about embedding analytics into the process.

2016-08-25

Too Much Information: Making Sense Of Big Data

The abundance of information online and across our devices can overwhelm even the most technically savvy individuals.

2016-08-19

Google Uses AI To Save On It’s Energy Bills

Its artificial intelligence division, DeepMind, has cut Google's data centres' energy consumption by 15%, using a machine-learning algorithm.

2016-08-19

CISOs Need Teamwork & A Strategic Framework

Companies may not fully understand the nature of modern threats. Simply placing a higher priority on security may not lead to improved measures.

2016-08-17

Israeli Business Expands Its Cyber Footprint

Israel Aerospace Industries (IAI) is making big strides growing its cybersecurity business.

2016-08-18

Turning Big Data into Smart Data

Big Data has become one of the key buzzwords for businesses everywhere. But Without structure any amount of data is unusable.

2016-08-16

What Makes A Data Scientist?

What does it take to have a brilliant career in the hottest sector in the technology industry? It all starts with mathematics....

2016-08-15

James Bond - Pen Tester

Pen-testing can use deception to counter spear-phishing and other superficially benign threats.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

VMworld

VMworld

VMworld is a global conference for virtualization and cloud computing, including associated security issues.

CyberVista

CyberVista

CyberVista is a cybersecurity training education and workforce development company. Our mission is to eliminate the skills gap by creating job ready professionals.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

NI Cyber Security Centre

NI Cyber Security Centre

NI Cyber Security Centre works to make Northern Ireland cyber safe, secure and resilient for its citizens and businesses.

Alea Consulting

Alea Consulting

Alea Consulting is a global risk mitigation and investigative consulting firm, which helps organizations reduce reputation and operational concerns.

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL) is the largest integrated Information Communication Technology (ICT) company of Pakistan.

Vaultinum

Vaultinum

Vaultinum are a trusted independent third party specialized in the protection and audit of digital assets.

CloudDefense.AI

CloudDefense.AI

CloudDefense.AI is an industry-leading multi-layered Cloud Native Application and Protection Platform (CNAPP) that safeguards your cloud infrastructure and cloud-native apps,

Defence Innovation Accelerator for the North Atlantic (DIANA)

Defence Innovation Accelerator for the North Atlantic (DIANA)

The NATO DIANA accelerator programme is designed to equip businesses with the skills and knowledge to navigate the world of deep tech, dual-use innovation.

NoviFlow

NoviFlow

NoviFlow is a leading provider of terabit networking software solutions for Communication Service Providers (CSPs).

ioSENTRIX

ioSENTRIX

ioSENTRIX offers tailored, risk-focused assessments that reduce true business risk.

Rakuten Maritime

Rakuten Maritime

Rakuten Maritime is your trusted partner in maritime cybersecurity, offering comprehensive and proactive solutions tailored to every stage of a ship’s life cycle.