BUSINESS > Services > IT & Telecoms


« Back to News

2015-01-28

Plans to Conquer: Chinese Internet Giant Tencent Targets Silicon Valley

Tencent is the Chinese Internet giant to rival Silicon Valley's titans and is not far behind Amazon, Google, eBay and Facebook.

2015-01-29

New institute to train cyber security talent

An institute for training network and information-security talent has been established at Xidian University in Xi'an, Shaanxi province, to bolster national security.

2015-01-29

Macro-based malware is making a comeback

For the past several months, different groups of attackers have distributed malware through Microsoft Office documents that contain malicious macros, reviving a technique that has been out of style for more than a decade.

2015-02-05

UK: New £3m cyber innovation centre in Gloucester

A new cyber innovation unit will open in Gloucester this week. Raytheon will officially launch the new unit, which has been set up to help protect computer networks from cyber attacks.

2015-02-05

Hacking Paranoia: Switzerland Cashing In By Marketing Itself As A 'Safe Haven' For Storing Data

Switzerland, facing an erosion of the banking secrecy laws that helped make it the world's banker, is now touting its reputation as a safe and stable haven to become a global data vault.

2015-02-05

Apple iOS Backdoor: Snowden says iPhone is a Government Spy

Infamous former NSA contractor Edward Snowden thinks that Apple's iPhone has "unique computer software" that authorities can activate remotely to be in a position to gather information about the user.

2015-01-21

Android Apps Collect Personal Data – But just how much may surprise you

Many apps collect plenty of personal data in an attempt to track users online and serve them targeted ads in the process.

2015-01-09

Google faces US privacy suit over user data policy

A California court has allowed a privacy class action suit against Google to continue, though only in part.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

RiskSense

RiskSense

RiskSense empowers enterprises and governments to reveal cyber risk, quickly orchestrate remediation, and monitor the results.

Sparta Consulting

Sparta Consulting

Sparta Consulting is an information management and business development full service provider.

MerlinCryption

MerlinCryption

MerlinCryption develops infrastructure security software, delivering advanced encryption, authentication, and random data generators, for Cloud, VoIP, eCommerce, M2M, and USB hardware.

Cyber Security & Cloud Expo

Cyber Security & Cloud Expo

The Cyber Security & Cloud Expo is an international event series in London, Amsterdam and Silicon Valley.

R3

R3

R3 is an enterprise blockchain software firm working with a broad ecosystem of more than 300 participants across multiple industries to develop blockchain applications.

MISP Project

MISP Project

The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.

GreyNoise Intelligence

GreyNoise Intelligence

GreyNoise Intelligence is a cyber security company that collects, labels, and analyzes Internet-wide scan and attack data.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

PacketViper

PacketViper

PacketViper’s Deception360 actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

EkoCyber

EkoCyber

EkoCyber partner with businesses as a value-added MSSP to provide top-tier, trusted and transparent cyber security services at an affordable price point.

Zeta Sky

Zeta Sky

Zeta Sky offers a full range of IT and cyber-security services for your business.

Badge

Badge

Badge authenticates you on-demand for every application, on any device, without storing any secrets.

Windstream

Windstream

Windstream is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the US.

The Missing Link

The Missing Link

Whether your requirements are large or small, The Missing Link have you covered with our core offerings including IT & Cloud, Cyber Security and Automation.