BUSINESS > Services > IT & Telecoms


« Back to News

2015-08-06

Stagefright: New Android Vulnerability Dubbed 'heartbleed for mobile'

An attacker can take over the vast majority of Android phones with just a text message.

2015-07-28

The BYOD Debate is Not Over

Most workers use personal mobile phones for work tasks, often outside of work hours.

2015-07-27

Avoid Hiring a Cybercriminal: understand motivations & thoroughly vet employees

Employees are the biggest threat to business integrity. As FireEye has discovered.

2015-07-23

Cyber-security Startup Darktrace Valued at More Than £60m

Reinventing the way organisations protect their data and assets.

2015-07-21

Adobe Tackles New Flash Threat After Hacker Team Leak

Holes in Adobe Flash only come to light following Hacking Team data dump.

2015-07-21

IBM Unveils Most Powerful Chip Ever Created

Moore's Law in Action: Smaller, Faster, Cooler, More Powerful.

2015-07-21

CyberSecurity Future: Humans & Machines Work Symbiotically

Outnumbered: Because of the IoT there will be over 40 billion connected devices in use within five years.

2015-07-15

Active Cyber Defense

Most of today’s static & reactive security defense mechanisms are ineffective against sophisticated attackers. Opinion by Chris Daly

2015-07-15

Cyber Threats Create Business Opportunities

Finland is building strategic clusters for education and research in information security.

2015-07-15

The Third Industrial Revolution

A third industrial revolution is under way & like all revolutions, this one will be disruptive.

2015-07-15

Unlocking the Potential of the Internet of Things

McKinsey think that the IoT has a total potential economic impact of $3.9 trillion to $11.1 trillion a year by 2025.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Malware Patrol

Malware Patrol

Malware Patrol provides intelligent threat data that protects against cyber attacks.

_cyel

_cyel

_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system.

New Zealand Internet Task Force (NZITF)

New Zealand Internet Task Force (NZITF)

The New Zealand Internet Task Force (NZITF) is a non-profit with the mission of improving the cyber security posture of New Zealand.

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities including formulating national ICT strategy and policy.

CyberGRX

CyberGRX

The CyberGRX Exchange and our risk assessments-as-a-service help Enterprises and Third Parties cost-effectively identify, prioritize and mitigate risk.

Evanston Technology Partners (ETP)

Evanston Technology Partners (ETP)

ETP provides services and solutions to enable and transform businesses in the areas of cybersecurity, data protection, and efficient operations practices.

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

ValidSoft

ValidSoft

ValidSoft is a security software company, providing telecommunications-based multi-factor authentication, identity and transaction verification technology.

Lattice Semiconductor

Lattice Semiconductor

Lattice Semiconductor solves customer problems across the network, from the Edge to the Cloud, in the growing communications, computing, industrial, automotive and consumer markets.

Maritime Cyber Threats Research Group - University of Plymouth

Maritime Cyber Threats Research Group - University of Plymouth

The Maritime Cyber Threats research group of the University of Plymouth is focused on investigating marine cyber threats and researching solutions.

GLIMPS

GLIMPS

GLIMPS-Malware automatically detects malware affecting standard computer systems, manufacturing systems, IOT or automotive domains.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

SolidityScan

SolidityScan

SolidityScan is an advanced smart contract scanning tool designed to uncover vulnerabilities and proactively address risks within your code.

Proaxiom

Proaxiom

Proaxiom are focused on erasing cyber driven panic paralysis for Small and Medium Enterprises through brilliant cyber technologies which drive productivity and support growth.

Endari

Endari

Endari specializes in building cybersecurity maturity within the operational DNA of early-stage startups and SMBs.