BUSINESS > Services > IT & Telecoms


« Back to News

2018-10-31

British Refuse To Co-operate With Belgian Hacking Inquiry

The UK refusal to cooperate with an inquiry into GCHQ’s alleged hacking of Belgacom could damage diplomatic relations with NATO partners.

2018-10-30

IBM Spends $34B To Buy Red Hat

Older technology companies like IBM are turning to deal-making to gain scale and fend off competitors in cloud computing.

2018-10-26

Facebook Wants To Buy A Cybersecurity Firm. Which One?

Facebook quickly wants to get its hands on security tools that will easily integrate with its current services and has a big acquisition in mind.

2018-10-26

Microsoft, Amazon CEOs Vow To Continue Defense Work

Google’s decision not to bid for the Pentagon’s $10 billion JEDI cloud contract draws criticism from CEOs of rival tech companies.

2018-10-29

Cybersecurity + Blockchain = Big Progress

Blockchain-powered cybersecurity solutions which address a range of pressing challenges are happening now and they’re showing real promise.

2018-10-26

New Partnership To Combine Cyber AI And Forensics

Darktrace and Endace have announced a partnership that combines Darktrace's cyber AI with Endace's forensic capabilities.

2018-10-24

New iPhone Bug Gives Anyone Access To Your Photos

A recently discovered bug in iOS 12 allows attackers with physical access to your iPhone to access your contacts and photos.

2018-10-18

Mobile Security Threats Put Businesses At Risk

A significant lack of visibility into non-corporate devices and networks is putting businesses at risk of data leakage and phishing attacks.

2018-10-22

Routers With Weak Passwords Will Soon Be Illegal In California

A new California law would make it illegal to sell Internet-connected devices that aren’t equipped with a unique password.

2018-10-12

Neither US Or UK  Investigated Chinese Spy Chips

Apple, Amazon and Super Micro strongly deny a bombshell report about implanted spy chips and they are supported by the DHS and the NCSC.

2018-10-08

China Compromises Tech Companies With Malicious Microchips

Has the Chinese military really implanted malicious microchips in motherboards used by almost 30 US companies and intelligence agencies?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

AirCUVE

AirCUVE

AirCUVE provide authentication and access control solutions for networks and mobile security.

IntSights

IntSights

IntSights is an intelligence driven security provider offering rapid, accurate cyberthreat intelligence and incident mitigation in real time

Secure Decisions

Secure Decisions

Secure Decisions focus on research and product development related to national security including information assurance, computer network defense, cyber security education, and application security.

Centurion Information Security

Centurion Information Security

Centurion Information Security is a consulting firm based in Singapore that specialises in penetration testing and security assessment services.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

TypingDNA

TypingDNA

TypingDNA uses AI to recognise people by the way they type on desktop keyboards and mobile devices.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

OnDefend

OnDefend

OnDefend delivers information security solutions that improve overall security posture, reduce risks and defend against continually evolving and persistent cyber adversaries.

Sygnia

Sygnia

Sygnia is a cyber technology and services company, providing high-end consulting and incident response support for organizations worldwide.

Intechtel

Intechtel

Intechtel is a cyber security company, in addition to providing other internet, technology and telephone services.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

Corsica Technologies

Corsica Technologies

Corsica Technologies is recognized as one of the top managed IT and cybersecurity service providers. Our integrated IT and cybersecurity services protect companies and enable them to succeed.

CyberCatch

CyberCatch

CyberCatch provides an innovative cybersecurity Software-as-a-Service (SaaS) platform designed for SMBs.

Infiot

Infiot

Infiot is a pioneer in enabling secure, reliable access with zero trust security, network optimization, edge-intelligence and AI driven operations for all remote users, devices, sites and cloud.

Alset Technologies

Alset Technologies

Alset Technologies provides DASH - a comprehensive solution to DISA STIG (Security Technical Implementation Guide) compliance.