BUSINESS > Services > IT & Telecoms


« Back to News

2020-04-06

IoT - Pandemics, Opportunities And Massive Data Risks

The IoT transfers very large amounts of data without human interaction and this data is difficult to process using traditional management tools.

2020-04-01

Beware Spoofing Attacks

Spoofing Is No Joke: Eleven types of spoofing attack that every security professional should know about. By David Balaban

2020-04-20

Singapore Introduces Home Cyber Security Labelling

Singapore is one of the first countries to require labels on Wi-Fi routers, home hubs and other IoT devices to strengthen domestic cyber security.

2020-03-27

Rapid Deployment Of 5G Is A Headache

The transition to 5G increases both the speed and volume of data communication, but there are a number of important issues which are problematic.

2020-03-23

Covid-19 Virus Impacts Home Working

The C-19 virus is being increasingly used as a subject to engage readers with phishing emails and deliver a range of other attack vectors.

2020-03-23

Remote Working Is On Suddenly On Trend

The adoption of secure technology to enable the flexibility of working from multi-locations and online collaboration is suddenly urgent.

2020-03-13

Coronavirus And Your Phone

If you haven't cleaned your phone in a while, think twice before holding it up to your face the next time you have a phone call.

2020-03-09

Why 5G Technology Is A Geopolitical Issue

Innovative use of software across 5G platforms raises problems, as the technology serves to widen the attack surface of the network.

2020-03-06

The US & Britain Edge Closer To An Agreement On Huawei

Britain has conceded to US pressure and is about to agree more strict limitations on Huawei’s presence in its 5G mobile telecom infrastructure.

2020-03-17

Why 5G Is Going To Quickly Replace 4G

5G will unlock new applications that were simply not possible with 4G. Specifically, workplaces will no longer be defined by a physical location.

2020-03-13

The Most Common Cyber Attacks

Over 32% of UK businesses identified an attack over last 12 months and 22% of charities reported they were attacked over the same period.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Janusnet

Janusnet

Janusnet develops software and solutions for organisations to enforce and manage data security.

Telos

Telos

Telos offers cybersecurity solutions and services that empower and protect the world’s most security-conscious enterprises.

NXP Semiconductors

NXP Semiconductors

NXP is a world leader in secure connectivity solutions for embedded applications and the Internet of Things.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

Renesas Electronics

Renesas Electronics

Renesas Electronics delivers trusted embedded design innovation with solutions that enable billions of connected, intelligent devices to enhance the way people work and live - securely and safely.

SixThirty CYBER

SixThirty CYBER

SixThirty is a venture fund that invests in early-stage enterprise technology companies from around the world building FinTech, InsurTech, and Cybersecurity solutions.

CyberCube

CyberCube

CyberCube provide world-leading cyber risk analytics for the cyber insurance market.

GovernmentCIO

GovernmentCIO

GovernmentCIO was founded with a single purpose: to transform government IT. We are thought leaders in data analytics, machine learning, cybersecurity and IT transformation.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP provides solutions and services around Core Infrastructure, Cloud, Cyber Security, Enterprise Applications, Intelligent Automation and Data, Smart Buildings, and Managed Services.

Dawgen Global

Dawgen Global

Dawgen Global is an integrated multidisciplinary professional service firm in the Caribbean Region providing a range of services including Risk Management and Information Systems Assurance.

Kaesim Cybersecurity

Kaesim Cybersecurity

Kaesim are a global team of cybersecurity experts protecting businesses since 2015. We stop bad people damaging your business, your data and your reputation.

Nukke

Nukke

Nukke offers advanced cybersecurity software and tailored solutions for your business.

Clear Ridge Defense

Clear Ridge Defense

Clear Ridge was founded in April 2015 with the mission and vision to support Joint, Service Cyber Components, and commercial clients in specialized cyber support.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.