BUSINESS > Services > IT & Telecoms


« Back to News

2020-02-03

Mandatory IoT Security In Britain

The UK government has unveiled a new IoT law to prohibit the sale of smart consumer products that fail to meet three strict security requirements.

2020-01-29

Britain Allows Huawei 5G Network Access Against US Advice

The UK Government has decided to give the contoversial Chinese company a significant role in building the UK’s 5G mobile and data network.

2020-01-21

5G Will Reduce Car Accidents

Connected car systems with 5G will enable data sharing to improve the effectiveness of advanced driver assistance systems and to save lives.

2020-01-20

Can A 5G Network Really Be Secure?

Governments in Australia, Britain and Germany are in difficulty over the choice of technology suppliers to establish their national 5G networks.

2020-01-15

Ireland’s Cyber Strategy

A cyberattack on one of the tech giants based in Ireland could have an “immediate” impact across the EU, says the new national cyber strategy.

2020-01-16

Smart Cities Already Exist

A 'smart city' is a framework for living that is totally connected to the Internet, with the infrastructure dependent on remaining connected.

2020-01-13

Disconnected: Russia Tests Its Own Internet

Russia has successfully tested a country-wide alternative to the global Internet, restricting the points connecting its network to the rest the world.

2020-01-10

Cyber Security’s New Workforce

The cyber security workforce shortage is reaching a crisis. The US has developed a network of rigorous training programs but the big picture is bad.

2020-01-08

Ten Predictions For Smart Cities

With $80 billion already invested, we can expect fewer IoT projects, more citizen input, and more communication between cars and infrastructure.

2020-01-07

Top 20 Cyber Security Companies At The Start Of 2020

Here are 20 of the best cybersecurity companies: With different approaches, from mavericks to major brands, some known for other types of solutions.

2019-12-20

Cyber Spying, Digital Theft & Espionage

Malware spies form armies of nefarious hackers from around the world who use cyber warfare methods for economic, political, or military gain.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cloudera

Cloudera

Cloudera provide the world’s fastest, easiest, and most secure data platform built on Hadoop.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Black Kite

Black Kite

Black Kite (formerly NormShield) provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring.

Cyber Resilient Energy Delivery Consortium (CREDC)

Cyber Resilient Energy Delivery Consortium (CREDC)

CREDC performs multidisciplinary R&D in support of the Energy Sector Control Systems Working Group’s Roadmap of resilient Energy Delivery Systems (EDS).

Approach

Approach

Approach is a leading provider of cyber security consulting and secure application development services in Belgium.

Sompo International

Sompo International

Sompo International is a global specialty provider of property and casualty insurance and reinsurance services including Cyber & Network Risk.

BrandProtections.Online

BrandProtections.Online

BrandProtections.online offer end-to-end customer support solutions to help protect against threats which may affect your brand online.

Nanitor

Nanitor

Nanitor is a powerful cybersecurity management platform focusing on hardening security fundamentals across your global IT infrastructure.

Digital Silence

Digital Silence

Digital Silence is a world-class provider of information security research and consulting services.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

The CyberWire

The CyberWire

The CyberWire gets people up to speed on cyber quickly and keeps them a step ahead in a continually changing industry.

PCI Security Standards Council (PCI SSC)

PCI Security Standards Council (PCI SSC)

The PCI Security Standards Council is a global forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.

Bluecyber Insurance

Bluecyber Insurance

At Bluecyber, we are revolutionizing the cyber insurance market, democratizing access to digital protection for small and medium-sized businesses.

CYSEC Global

CYSEC Global

CYSEC Global is a series of summits dedicated to tackle regional cyber security challenges.