BUSINESS > Services > IT & Telecoms


« Back to News

2016-03-11

Apple’s Best Defence Against The FBI Is The One It Can’t Admit

Some say the debate over privacy embodied in Apple v FBI conceals the problem that iPhone already has backdoors which Apple hasn’t yet closed.

2016-03-11

Japan's Critical Infrastructure Under Cyberattack

Waves of cyber attacks against key industries across Japan, S. Korea, the United States, Europe and other Southeast Asian countries. But where from?

2016-03-08

Many Organisations Are Too Lax About Mobile Data Threats

Mobile devices can be a critical part of any cyber attack and mobile data breaches are more common than you might think.

2016-03-07

Apple v FBI: The US Debates Privacy

Is there such a thing as security that is so good that it's a danger to society?

2016-03-04

8 in 10 IT Pros Believe Data Is Cloud Safer

Most professionals believe that when facing hardware malfunctions & environmental disasters, their data is safer in the cloud than on premises.

2016-03-01

Mobile And IOT Technologies Are Inside The Curve Of Human Time.

The leap from human time to computer time has relevance in business today. Opinion By Kevin Benedict

2016-02-29

Tor: Mystery Spike In Hidden Addresses

A security expert has noticed an unprecedented spike in the number of hidden addresses on the Tor network.

2016-02-29

Android Banking Trojan Xbot Is Also Ransomware

New Android malware steals online banking credentials and can hold a device's files hostage delivering a particularly nasty one-two punch.

2016-03-02

IT Spending Predicted To Slow

Worldwide IT spending is expected to post a major slowdown in 2016, in a significantly slower pace of tech spending growth.

2016-03-02

Big Data & Predictive Analytics Can Identify Cyber Risks

Using predictive indicators to detect the unknown risk is incredibly challenging but, properly used, big data can solve big business problems.

2016-03-04

Cybersecurity Is Childsplay

Estonia sees long-term benefits to teaching computer security in schools.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

Romanian Association for Information Security Assurance (RAISA)

Romanian Association for Information Security Assurance (RAISA)

RAISA promotes and supports information security activities and creates a community for the exchange of knowledge between specialists, academic and corporate environment in Romania.

PRODAFT

PRODAFT

PRODAFT, Proactive Defense Against Future Threats, is a cyber security and cyber intelligence company providing solutions to commercial customers and government institutions.

Digital Arts

Digital Arts

Digital Arts provides internet security software and appliance products for companies and individuals.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

Sponge

Sponge

Sponge is a world-renowned digital learning provider on a mission to make learning unforgettable.

GreenWorld Technologies

GreenWorld Technologies

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing.

Rezilion

Rezilion

Rezilion is a stealth mode cyber-security start-up developing a cutting edge technology that makes cloud environments self-protecting and resilient to cyber-attacks.

CloudSEK

CloudSEK

CloudSEK has set its sights on building the world’s fastest and most reliable AI technology, that identifies and resolves digital threats.

Privacyware

Privacyware

Privacyware's ThreatSentry combines a state-of-the-art Web Application Firewall and port-level firewall with advanced behavioral filtering to block unwanted IIS traffic and web application threats.

Pires Investments

Pires Investments

Pires is building an investment portfolio of high-tech businesses across areas such as Artificial Intelligence, Internet of Things, Cyber Security and Augmented/Virtual Reality.

Trilateral Research

Trilateral Research

Trilateral Research provide regulatory and policy advice; develop new data-driven technologies and contribute to the latest standards in safeguarding privacy, ethics and human rights.

Alias

Alias

Alias (formerly Alias Forensics) provide penetration testing, vulnerability assessments, incident response and security consulting services.

AI Spera

AI Spera

AI-Driven Cyber Threat Intelligence Security. AI Spera provides real-time intelligence to empower your security competences in all aspects of the business.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.