BUSINESS > Services > Health & Welfare


« Back to News

2020-04-28

Cyber Criminals Exploit Lockdown Workers

Home-based WiFi networks and 4G connections for remote work don’t have anything like the resilience of corporate security technologies.

2020-04-22

How Coronavirus Helps Hackers Get Rich

Cybercrime’s response to the COVID-19 outbreak is a toxic cocktail of malware distribution and fraud to take advantage of our fears. By David Balaban

2020-04-17

Pandemic: 'Normal' Crime Drops While Cyber Crime Jumps

The coronavirus lockdown has led to a 20% drop in traditional crime but remote-working means people are much more vulnerable to online fraud.

2020-04-16

Big Tech Benefits From COVID-19

The global coronavirus pandemic crisis provides a golden hour for big tech companies and they may emerge from the crisis even stronger.

2020-04-16

Pandemic Prevention Using Blockchain

Blockchain is increasingly being considered as a potentially powerful tool to assist with critical aspects of containing the coronavirus outbreak.

2020-04-10

Supporting British Healthcare Cybersecurity During COVID-19

The current crisis is an opportunity for the UK government to show agility in how it deals with cyber threats to the NHS. By Joyce Hakmeh

2020-04-06

IoT - Pandemics, Opportunities And Massive Data Risks

The IoT transfers very large amounts of data without human interaction and this data is difficult to process using traditional management tools.

2020-03-26

AI Can Give An Early Warning Of Coronavirus

When applied to unstructured data, Artificial Intelligence is better at simulating disease spread than algorithms that rely on public health data.

2019-11-15

Google Challenged For Collecting American Health Data

Google and a US healthcare company have been secretly working together on a project to store and analyse millions of patient medical records.

2019-11-11

Cyber Crime Is An Increasing Risk For Charities

Cyber crime is a greater risk to the charity sector than other sectors and smaller organisations are particularly vulnerable.

2019-11-04

A £370m Investment To Boost AI In Britain

Big companies, universities and government have combined to invest in artificial intelligence, with a focus on researching applications in Healthcare.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

National Authority Against Electronic Attacks (NAAEA) - Greece

National Authority Against Electronic Attacks (NAAEA) - Greece

The National Authority Against Electronic Attacks (NAAEA) is the national computer emergency response team of Greece.

Lacework

Lacework

Lacework brings speed, scale, and automation to cloud security and allows security and DevOps teams to collaborate on keeping data and applications safe.

SecureNinja

SecureNinja

SecureNinja provides professional training, certifications & professional services related to all facets of Information Technology and Cyber Security.

Torsion Information Security

Torsion Information Security

Torsion is an innovative information security and compliance engine, which runs either in the cloud or your data centre.

Pareteum

Pareteum

Pareteum is a leading Global provider of mobile networking software and services. Our mission is to provide a single solution to the problem of fully enabling and securing the Mobile Cloud.

ES2

ES2

ES2 is a consulting organisation specialising in Enterprise Security and Solutions Services.

SaltStack

SaltStack

SaltStack develops award-winning intelligent IT automation software. We help businesses more efficiently secure and manage all aspects of their digital infrastructure.

DivvyCloud

DivvyCloud

DivvyCloud protects your cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges.

NeuShield

NeuShield

NeuShield is the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

JFrog

JFrog

JFrog is on a mission to enable continuous updates through Liquid Software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime.

Swiss It Security Group

Swiss It Security Group

Swiss It Security Group offers clients complete IT security concepts based on innovative solutions and technology, with a focus on protection, detection and defence.

CyberX9

CyberX9

CyberX9 helps you protect against a wide range of cyber attacks whether you are a business or a high-net worth individual under risk.

Intuitive Research & Technology Corp

Intuitive Research & Technology Corp

Intuitive Research and Technology is an aerospace engineering and analysis firm providing services to the Department of Defense, government agencies, and commercial companies.

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency of Thailand is responsible for coordinating and implementing national cybersecurity policies, strategies, and initiatives.

Gutsy

Gutsy

Gutsy uses process mining to help organizations visualize and analyze their complex security processes to understand how they actually run, based on observable event data.