BUSINESS > Services > IT & Telecoms


« Back to News

2015-05-06

UK Rail Signals Can Be Hacked To Cause Crashes

Rogue employee could hack the new rail system and cause a crash.

2015-05-04

US Is Still the Biggest Source of Surging Malware Attacks

A majority of the cyber attacks on US companies originate from inside the country rather than from the outside.

2015-04-28

Largest U.S. Data Breaches in the Last 10 Years

A Telling Infographic: In 2014 alone more than 900 million data records were lost or stolen.

2015-04-30

Cyber Security in China

Chinese Internet Security is a Key Location Factor and a Challenge to Western Businesses

2015-04-29

Will Biometrics Take Over From Passwords?

People are fed up with battling to remember dozens of passwords.

2015-04-27

Google Adds Real-Time Analysis to its Cloud Service

Google is betting that real-time processing is the future of big data analysis.

2015-04-22

NSA’s Plan to Snowden-Proof Data Using the Cloud

With NSA’s widespread adoption of cloud-based computing, the spy agency has made a big technology bet.

2015-04-17

Cloud-based Business Intelligence Goes Mainstream

More than 50 percent of businesses currently use or plan to use cloud-based business intelligence.

2015-04-08

US: Comcast Ultra-fast Internet by 2016

Internet speeds of up to 2 gigabits per second to the majority of its nearly 22 million subscribers.

2015-04-15

Proactive Cyber Security Strategies Improve Security Effectiveness

New Research from Accenture & Ponemon Institute quantify success factors of companies that have improved their cyber security strategies.

2015-04-14

Seeing Your Business Through the Eyes of a Hacker

Attacks are growing more sophisticated and more damaging. Companies need to take a different approach.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

ISACA

ISACA

ISACA is a global professional association and learning organization for members who work in information security, governance, assurance, rissk and privacy.

it-sa 365

it-sa 365

it-sa 365 is a digital platform for connecting IT security vendors and experts with those who bear responsibility for IT security in management and technology.

Teradata

Teradata

Teradata is a leading provider of enterprise big data analytics and services. Applications include Cyber Security Analytics.

CyberPolicy

CyberPolicy

CyberPolicy is a cyber protection solution for small businesses. It combines three important components against cyber threats - Cyber Plan, Cybersecurity and Cyber Insurance.

Bittium

Bittium

Bittium provides proven information security solutions for mobile devices and portable computers.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

Secure Soft

Secure Soft

Secure Soft are experts in Computer and Information Security with a presence in Peru, Colombia and Ecuador.

Optimum Speciality Risks

Optimum Speciality Risks

Optimum Speciality Risks are an experienced team of cyber insurance experts, backed by Lloyds of London.

Tetrad Digital Integrity (TDI)

Tetrad Digital Integrity (TDI)

TDI is a world-class consulting firm offering cybersecurity services to government agencies and commercial clients around the world.

Proximity

Proximity

Proximity is a leading professional services organisation providing consulting, legal and commercial advisory solutions with a focus on government and regulated industries.

PlexTrac

PlexTrac

PlexTrac is a cybersecurity reporting and workflow management platform that supercharges security programs, making them more effective, efficient, and proactive.

SGTech

SGTech

SGTech is the leading trade association for Singapore's tech industry, offering focused support and development to both strategic and emerging sectors in the industry.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

Amplix

Amplix

In the race to create value for your enterprise, Amplix is your best asset for making technology decisions and optimizing your IT infrastructure, cloud usage, and security posture.