BUSINESS > Services > IT & Telecoms


« Back to News

2015-05-24

Silicon Valley a Major Player in Cyberwarfare

US Department of Defense will provide venture capital funding to startups that can help the Pentagon develop more advanced cybersecurity.

2015-05-22

Countering Cyber Criminals with Biometrics

Biometrics, Smartphones, fingerprint readers; the financial services sector is beginning to to invest in new security measures.

2015-05-20

Predictions for cyber-crime in 2015 and how the Security Industry is Responding

Last year was littered with high-profile cyber threats and security breaches. In 2015, the frequency and severity of cyber-attacks will increase.

2015-05-19

Growing number of corporate cyber attacks in Ireland

More than half of Irish companies suffered a security incident last year.

2015-05-19

Fast Growing Companies Use CIOs Technology Strategy

Over performing companies tend to lean more heavily on CIOs during the long-term planning process.

2015-05-18

Google Says Self-Driving Cars Drive Better Than You

Google has a fleet of 20 plus self-driving cars which are now averaging around 10,000 self-driven miles per week.

2015-05-12

Kaspersky Denies KGB Connections

Do Kaspersky Lab have ties to Russia's Federal Security Service (FSB)?

2015-05-12

There is No Secure Inside – So Get the Most from your Firewall

What about all of that data you shipped off to the cloud? Is it inside?

2015-05-16

Data Protection Drives Cloud Security Market

The cloud security services market grew 14% in 2014 to $7.2 billion worldwide.

2015-05-16

IBM Breakthrough In Quantum Computing

IBM scientists have announced the two primary advances towards the quantum computer’s practical realization.

2015-05-12

UK’s Internet Bandwidth Could Soon Be Choked

Current optical cable and switches will reach their capacity for data throughput by 2020.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

Progress Flowmon

Progress Flowmon

Progress Flowmon (formerly Flowmon Networks) provide high performance network monitoring technology and behavior analytics to enhance network performance and deal with cyber threats.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

The Media Trust

The Media Trust

The Media Trust continuously scans websites, ad tags and mobile apps and alerts on anomalies affecting websites and visitors.

Ravelin Technology

Ravelin Technology

Ravelin prevents chargebacks, fraud, and account takeover. Machine learning and human insight combine for highly accurate fraud detection and prevention.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

SAIFE

SAIFE

SAIFE has adapted a Software Defined Perimeter approach and paired it with a Zero Trust model that defines access by the user, their device, and where they are located.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

ProCheckUp

ProCheckUp

ProCheckUp is a London-based independent provider of cyber security services, including IT Security, Assurance, Compliance and Incident Response.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

VISO Cyber Security

VISO Cyber Security

VISO provide Cyber Security Consulting and CISO as a Service to companies who need to augment their leadership teams with information security expertise.

Moonsense

Moonsense

Moonsense is on a mission to level the playing field in the fight against online fraud.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.

The Cyber Scheme

The Cyber Scheme

The Cyber Scheme provides NCSC certified and assured assessments, training and career support for security testers & technical cyber professionals.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.