BUSINESS > Services > IT & Telecoms


« Back to News

2021-02-16

British Parliament Wakes Up To Huawei

British MPs warn the government to be proactive with legislation on emerging technologies and learn from its flip-flop over Huawei's 5G system.

2021-02-12

5G Will Disrupt Cyber Security

The transition to 5G will enable the connection of billions of new devices and means an overhaul of infrastructure.The stakes could not be higher.

2021-02-09

Everything You Need To Know About Hashing Algorithms

Hashing is a new method that aims to protect personal data and is widely used in cryptography and blockchain. How does it work?

2021-02-08

More Critical Problems With SolarWinds

SolarWinds have learned of three more critical vulnerabilities with their software which could allow an attacker to steal their customers' vital data.

2021-02-03

Bezos Resigns As Amazon CEO

The founder of the technology giant which has had such a profound effect on everyday life will step down to spend more time with his space ship.

2021-02-01

5G Could Be A Cyber Security Revolution

Organisations implementing new security measures using 5G architecture are in the best position to protect themselves from being targeted.

2021-01-28

All About Malware

Malware is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use gain access to sensitive information.

2021-01-12

Software Developers Face Mounting Pressure

Driven by remote working, technical innovation and new work patterns, the software industry faces a steep learning curve in 2021.

2021-01-05

AI Will Soon Replace Cyber Security Staff

Cyber Security jobs will eventually be entirely automated and some professionals think that they will be replaced by AI in the next ten years.

2021-01-04

Detecting Rogue Mobile Devices

Controlling which mobile devices can connect to your network is crucial to ensuring the privacy and integrity of corporate assets and data.

2020-12-23

You Should Prepare Your Organization For A DDoS Attack

DDoS attacks are very serious and are becoming even more costly. If you’re running a business, you have to know how to prepare for them.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Tufin

Tufin

Tufin enables organizations to automate their security policy visibility, risk management, provisioning and compliance across their multi-vendor, hybrid environment.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

DTEX Systems

DTEX Systems

DTEX Systems is the global leader for insider risk management. We empower organizations to prevent data loss by proactively stopping insider risks from becoming insider threats.

Copenhagen FinTech

Copenhagen FinTech

Copenhagen FinTech is a centre for R&D and innovation in the Danish finance IT sector. Focus areas include cyber security and payments platforms.

CipherTrace

CipherTrace

CipherTrace develops cryptocurrency Anti-Money Laundering, cryptocurrency forensics, and blockchain threat intelligence solutions.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

Bolster

Bolster

Bolster (formerly RedMarlin) is an AI-based cyber-security platform designed to detect phishing and fraudulent sites in real-time.

InfoSystems Inc

InfoSystems Inc

InfoSystems provides reliable IT solutions to build and maintain strong and secure systems for both SMB and enterprise organizations.

Pires Investments

Pires Investments

Pires is building an investment portfolio of high-tech businesses across areas such as Artificial Intelligence, Internet of Things, Cyber Security and Augmented/Virtual Reality.

Plante Moran

Plante Moran

Plante Moran is a leading audit, tax, consulting, and wealth management firm. Areas of consulting expertise include cybersecurity.

Nanitor

Nanitor

Nanitor is a powerful cybersecurity management platform focusing on hardening security fundamentals across your global IT infrastructure.

ThreatDown

ThreatDown

ThreatDown, powered by Malwarebytes, is on a mission to overpower threats and empower IT by removing the complexity of detecting and stopping today’s most advanced threats.

NoviFlow

NoviFlow

NoviFlow is a leading provider of terabit networking software solutions for Communication Service Providers (CSPs).

Token Security

Token Security

Token is the new approach designed for the identity boom era. Introducing Machine-First Identity Security.

PDQ

PDQ

PDQ helps IT professionals to manage and organize hardware, software, and configuration data for Windows- and Apple-based devices.

Scope AI

Scope AI

Scope AI is an innovative technology company specializing in quantum security and machine learning.