BUSINESS > Services > IT & Telecoms


« Back to News

2018-05-24

Is the Pentagon Cloud Secure Enough to Hold Nuclear Secrets?

The US Government will shortly award a huge contract to host its most intimate defense secrets, thought to include its nuclear weapons codes.

2018-05-14

Three Ways That Automation & Machine Learning Are Changing Data Centres

Introducing self-managing data centers, where automation and machine learning handle administrative storage tasks.

2018-05-10

Senior IT Execs Admit Cyber Threats Are Out Of Control

60% of top IT executives say cyber threats in their organisation are out of control. But only 31% refresh their cybersecurity strategy annually.

2018-05-04

TSB's IT Meltdown Was Evident A Year Before

A customer service fiasco at the newly formed TSB bank was all too predictable from a series of risky management decisions and woeful IT execution.

2018-04-23

A New Distributed Database Adds GDPR Controls

The company with a terrible name introduces a useful new cloud data product to facilitate automated multi-territory compliance with GDPR.

2018-04-20

Google Chairman Unaware Of Pentagon AI Project

Google is bidding for a multi-billion dollar Pentagon cloud contract. Which comes as news to the company Chairman, Eric Schmidt.

2018-04-30

SpaceX Plan For 4k Satellite Broadband Network

SpaceX intends to launch a network of thousands of satellites creating blanket global broadband coverage.

2018-04-12

How to Access the Dark Web Anonymously

Are you trying to find out how to access the dark web? You will need an anoymising browser, but its unreliable, slow and you might not like it.

2018-04-11

Criminal Web-Injects Can Steal Cryptocurrency

Criminals are deploying a variety of tactics to try and profit from the cryptocurrency boom, including web-injects to intercept & modify web traffic.

2018-04-11

The Cloud Is A Key To Cyber Defence

Organisations need to grasp security intelligence and act on it faster to get ahead of attackers. Cloud-based security can make that possible.

2018-04-09

Home Working Is A Threat To Cybersecurity

Forget About BYOD: Chartity sector workers should avoid taking work devices and sensitive work information home with them.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Intelligence-sec

Intelligence-sec

Intelligence-Sec is a fully integrated Conferences and Exhibitions Company managing and producing topical events for the security industry.

Wilson Sonsini Goodrich & Rosati (WSGR)

Wilson Sonsini Goodrich & Rosati (WSGR)

WSGR is the premier provider of legal services to technology, life sciences, and growth enterprises worldwide. Practice areas include cybersecurity and data protection.

Cybernetic Global Intelligence (CGI)

Cybernetic Global Intelligence (CGI)

CGI is a global IT Security firm that helps companies protect their data and minimize their vulnerability to cyber threats through a range of services such as Security Audits and Managed Services.

Seric Systems

Seric Systems

Seric is a technology business specialising in security, infrastructure and data management.

Data61

Data61

Data61 is Australia’s leading digital research network offering the research capabilities, IP and collaboration programs to unleash the country’s digital & data-driven potential.

GuardianKey

GuardianKey

GuardianKey is a solution to protect systems against authentication attacks.

Checksum Consultancy

Checksum Consultancy

Checksum Consultancy specializes in Information security, Risk management, and IT governance.

BotRx

BotRx

BotRx is the only AI-enabled, automated fraud protection technology that allows fast & easy deployment - continually keeping invisible bad bots and agents at bay, so you can rest easy.

GroupSense

GroupSense

GroupSense helps governments and enterprises take control of digital risk with cyber reconnaissance, counterintelligence and monitoring for breached credentials.

Intechtel

Intechtel

Intechtel is a cyber security company, in addition to providing other internet, technology and telephone services.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Support Link Technologies (SLT)

Support Link Technologies (SLT)

Support Link Technologies are an IT Solutions Company committed to achieving customer satisfaction through excellent customer service.

KingsGuard Solutions

KingsGuard Solutions

KingsGuard Solutions is a San Diego Cybersecurity company that specializes in complex and innovative security solutions for companies throughout Southern California.

AnzenSage

AnzenSage

AnzenSage is a cybersecurity advisory consultancy specializing in security risk resilience for the food sector: agriculture, food manufacturing, food supply chain, vineyards, and wineries.

Blockfence

Blockfence

Blockfence are a seasoned crew versed in enterprise-grade cybersecurity and crypto, on a mission to collaboratively shape the future of Web3 security.

42Crunch

42Crunch

42Crunch provides API security testing and threat protection. We proactively test, fix and protect your APIs from development to runtime.