BUSINESS > Services > IT & Telecoms


« Back to News

2018-10-09

Secret Military Technology Now On Your Smartphone

Hawkeye 360 radio signal identification and tracking allows cell phone companies to better understand their customer locations and usage.

2018-10-10

Liberating Personal Data

Web inventor Sir Tim Berners-Lee has created a technology he says will give people more control over their data.

2018-09-26

Canada Is Suspicions Of Huawei

Canada is working to minimise cyber threats from equipment made by foreign telecommunications companies, including China’s Huawei.

2018-09-21

Millions Of WiFi Routers Are At Risk Of Hacking

Millions of WiFi networks are vulnerable due to weaknesses in how saved passwords in web browsers interact over unencrypted connections.

2018-09-18

What Every Small Business Should Know About Hackers & Cybersecurity

It’s a case of when, not if, a cyber attack will take place and preparation is the key. You cannot simply leave it to the IT department to deal with.

2018-09-14

Cybersecurity Needs A Collective Approach

The boom in cybercrime means it is no longer a problem reserved for the IT department - everyone must work together to tackle the threat.

2018-09-14

The Rise of AI Driven DDoS Attacks

The new era of AI driven DDoS will have the power of IoT-based attacks, plus powerful feedback loops & automatic optimisations.

2018-09-13

The 'Deep Web' May Be x 500 Bigger Than The ‘Normal Web’

The deep web can be accessed only with specific software and it is estimated to be about 400 to 500 times larger than the common Internet.

2018-09-03

Threat Posed By Satellite Systems

Satellite communications are vulnerable to hackers which, in the worst-case scenario, could turn satellite antennas into weapons.

2018-08-08

Dixons Carphone Data Breach Hits 10m Users

A data breach at electronics retailer Dixons Carphone is almost ten times larger than the company first thought.

2018-08-16

Balancing Security With Digital Transformation

How do companies keep up with the pace of technical innovation & competition while protecting their critical assets from security breaches?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Chubb

Chubb

Chubb is the world’s largest publicly traded property and casualty insurer. Commercial services include Cyber Risk insurance.

TSUNAMI

TSUNAMI

The TSUNAMi center focuses on software and system security and how trustworthy software can be built from COTS software components.

Zimperium

Zimperium

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks.

BioCatch

BioCatch

BioCatch uses behavioral biometrics for fraud prevention and detection. Continuous authentication for web and mobile applications to prevent new account fraud.

OneSpan

OneSpan

OneSpan (formerly Vasco Data Security) is a global leader in digital identity security, transaction security and business productivity.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

A3Sec

A3Sec

A3Sec provides professional solutions in the areas of Cybersecurity, Device Monitoring, Business Intelligence and Big Data.

CyGlass

CyGlass

CyGlass simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people.

RKVST

RKVST

RKVST is a powerful tool that builds trust in multi-party processes when it’s critical to have high assurance in data for confident decisions.

Flat6Labs

Flat6Labs

Flat6Labs is the MENA region’s leading seed and early stage venture capital firm, currently running the most renowned startup programs in the region.

Laneden

Laneden

Laneden specialise in helping organisations identify security concerns and quantify the risks you may have across your assets, using Penetration Testing, Threat Simulation and Compliance Testing.

Chugach Government Solutions (CGS)

Chugach Government Solutions (CGS)

CGS performs work for the Federal Government across 4 unique core lines of business, including: Facilities Management and Maintenance, Construction, Technical IT and Cyber Services, and Educational Se

Eqlipse Technologies

Eqlipse Technologies

Eqlipse Technologies provides products and high-end engineering solutions to customers in the Department of Defense and Intelligence Community.

WireGuard

WireGuard

WireGuard is a communication protocol and free and open-source software that implements encrypted virtual private networks (VPNs).

Increase Your Skills (IYS)

Increase Your Skills (IYS)

Armed and ready: raise awareness of cyberattacks in your company with the Full-Service Awareness Platform from IYS – fast and effective. We help you develop a robust, sustainable security strategy.