BUSINESS > Services > IT & Telecoms


« Back to News

2019-05-14

WhatsApp Penetrated By Spyware

Hackers have installed surveillance software on phones and other appliances exploiting a major weakness in Facebook’s WhatsApp messenger.

2019-05-08

A Microphchip That Can Stop Cyber Attacks

The chip, called Morpheus, blocks potential attacks by encrypting and randomly reshuffling key bits of its own code and data 20 times per second.

2019-05-08

Using Identity Access Management

Identity Access Management is a key element of modern cybersecurity strategy, So why then, aren’t more companies using it?

2019-05-07

AI Will Shape The Future 6G Network

6G will be an enormous step up from 5G and AI will become the enabling force behind a whole new generation of machine intelligence applications.

2019-04-25

Huawei To Be Given 5G Contracts In The UK

The British government looks ready to grant the Chinese tech giant eligible status to supply all “non-core” infrastructure related to the network.

2019-04-23

The CIA's Cloud Contract Is Worth Billions

The secret intelligence agency is planning a contract for commercial cloud computing services that will be worth “tens of billions” of dollars.

2019-04-15

Thales Spends £4.8Bn To Deliver Full - Range Cybersecurity

Thales aims to become a global leader and deliver complete end-to-end cyber security for the Internet of Things, cloud and mobile security.

2019-04-10

Critical Infrastructure Is Under Worldwide Attack

Every minute of the day, cyber-attacks are causing severe technology problems, disrupting and taking down different parts of the infrastructure system.

2019-04-10

What is The Canadian Institute For Cybersecurity & Why Does It Matter?

The new Canadian Institute for Cybersecurity is the first national institution of its kind to take such a multidisciplinary approach to cybersecurity.

2019-04-08

Financial Apps Are Vulnerable

New research reveals widespread security deficiencies indicating that financial institutions are failing when it comes to protecting their apps.

2019-04-04

Identity Management Fundamentals

Identity management is fundamental to information security. Why is it that so many organizations are terrible at it? By Evan Francen

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

CISPA Helmholtz Center for Information Security

CISPA Helmholtz Center for Information Security

The CISPA Helmholtz Center for Information Security is a German national Big Science Institution within the Helmholtz Association. Our research encompasses all aspects of Information Security.

Oneconsult

Oneconsult

Oneconsult provides cyber security services focusing on penetration tests / ethical hacking, ISO 27001 security audits and incident response & IT forensics.

Netrix

Netrix

Netrix is a Mexican company specialized in IT Security, with more than 18 years of experience in Managed Services, Professional Services and Turnkey Solutions related to Security.

Computer Network Defence (CND)

Computer Network Defence (CND)

Computer Network Defence (CND) are a Broad-Spectrum Cyber Security Consultancy and Recruitment Agency.

ioXt Alliance

ioXt Alliance

The ioXt Alliance is a group of manufacturers, industry alliances and government organizations dedicated to harmonizing best security practices in a highly connected world.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

NARIS

NARIS

NARIS is the leading provider of an integrated Governance, Risk and Compliance platform called NARIS GRC.

N-able

N-able

N-Able deliver simple and sophisticated monitoring, security, and business solutions that empower you to solve your toughest IT challenges.

Oxford Internet Institute - University of Oxford

Oxford Internet Institute - University of Oxford

The Oxford Internet Institute is a multidisciplinary research and teaching department of the University of Oxford, dedicated to the social science of the Internet.

Island

Island

Island puts the enterprise in complete control of the browser, delivering a level of governance, visibility, and productivity that simply weren’t possible before.

Ascent Solutions

Ascent Solutions

Ascent is built to help firms evolve their cybersecurity posture, modernize their Microsoft solutions, and accelerate their journey to the cloud.

Tenet3

Tenet3

Tenet3's vision is to make optimal cyber strategy development tractable, data driven, with concrete success metrics. The result is cost effective cyber resilience for our customers.