BUSINESS > Services > IT & Telecoms


« Back to News

2015-12-28

Enterprises Don’t Have Big Data, They Have Bad Data

Big data alone is silly. Building an enterprise with smart, usable data is what every company should strive to create.

2015-11-14

The Top 10 Information Security Jobs

Demand for Cybersecurity workers is outstripping supply and pay is going up.

2015-11-09

U.S Tech Companies Shouldn't Give China Code

China has been asking US technology companies to share proprietary information, ostensibly for security purposes.

2015-11-04

IBM Watson's Goodbye To Privacy

So much data that it can no longer be made sense of without artificial intelligence. Which has consequences for human privacy.

2015-11-02

Cyber Attack Recovery Times Cause Big Concerns

When it comes to limiting damage and preventing data breaches, time is the biggest challenge for security and risk professionals.

2015-10-31

ISPs Asked To Block Pirate Sites

UK Internet service providers have been asked to block access to dozens of URLs that are suspected of linking to pirated content.

2015-11-02

New Material Promises NSA-proof Wallpaper

A flexible material, thin and tough for wallpaper or woven fabric that can keep electronic emissions in, and electromagnetic pulses out.

2015-11-01

Can Russian Submarines Cut Off the Internet?

The Russian navy might be disrupting undersea cables.

2015-10-30

The Arrival of Algorithmic Business

In today’s digital era, dynamic, digital algorithms are at the core of new customer interactions.

2015-10-28

Hackers Compromise Cisco Web

Malicious, data stealing JavaScript injected in the Cisco Web VPN login page of targeted organizations is hosted on legitimate sites.

2015-10-28

Apple Removes Spy Apps

Apple recently removed several apps from its store that pose a security risk by exposing a person's Web traffic to untrusted sources.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Feitian Technologies

Feitian Technologies

Feitian Technologies provides authentication and transaction security products for financial institutions, telecoms, government and leading business enterprises.

Intelligence-sec

Intelligence-sec

Intelligence-Sec is a fully integrated Conferences and Exhibitions Company managing and producing topical events for the security industry.

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

Usenix

Usenix

Usenix brings together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of computing.

SecLytics

SecLytics

SecLytics is the leader in Predictive Threat Intelligence. Our SaaS-based Augur platform leverages behavioral profiling and machine learning to hunt down cyber criminals.

Clearswift

Clearswift

Clearswift is trusted by businesses, governments and defense organizations globally for its Adaptive Cyber Security and Data Loss Prevention solutions.

GreyCampus

GreyCampus

GreyCampus is a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management, Quality Management and Information Security.

IOTA Foundation

IOTA Foundation

The IOTA Foundation is a non-profit R&D organisation focused on developing the next generation of protocols for the connected world.

Cryptosense

Cryptosense

Cryptosense provides the first application security software dedicated to the detection and remediation of crypto vulnerabilities.

CYE

CYE

Utilizing data, numbers, and facts, CYE helps security leaders know what business assets are at risk and execute cost-effective remediation projects for optimal risk prevention.

Conatix

Conatix

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity.

Police CyberAlarm

Police CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning.

Cyber Security Canada

Cyber Security Canada

Cyber Security Canada is an accredited Certification Body for government-backed Cyber Security Certification Programs, designed specifically for small and medium-sized Canadian businesses.

CYDEF

CYDEF

CYDEF provides comprehensive, state-of-the-art cybersecurity protection that is accessible and affordable to organizations of any size.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

Haiku

Haiku

Haiku stands at the forefront of cybersecurity upskilling, leveraging video games to immerse you in a flow state for accelerated, enduring learning.