BUSINESS > Services > IT & Telecoms


« Back to News

2019-09-25

5G Needs A New Generation Of Security

5G networks can deliver much more data much faster, dramatically raising the stakes for ensuring the security & reliability of mobile communications.

2019-09-24

Who’s Afraid Of Huawei?

Understanding the 5G Security Concerns: Can the risks of using the Chinese tech giant's mobile network technology be mitigated?

2019-09-23

Business Migration To The Cloud

Making the decision to migrate to the cloud can be daunting. The tools are different and large-scale migration is not something to be taken lightly.

2019-09-06

French Cyber-Police, Avast & FBI Neutralise Global Botnet

French cyber police in the C3N cybercrime unit succeed in a very sophisticated piece of cyber intelligence, tracking, hacking and neutralisation.

2019-09-04

A New Era Of Malware

NotPetya has ushered in a new era of implant-enabled malware where public opinion is as much the target as traditional IT systems.

2019-09-04

Seven Cybersecurity Issues That Easily Go Unnoticed

Some cybersecurity issues and challenges can be harder to spot than others and it can lead to problems going unnoticed. By Chester Avey

2019-09-02

A Major Breach In Biometrics Security Database

BioStar: Over a million fingerprints and other sensitive data including unencrypted usernames and passwords have been found exposed online.

2019-08-28

Its Your People Who Contribute To Data Breaches

Human error is a major factor in many cyber breaches. A more integrative and business-wide approach to cyber security training is required.

2019-08-27

Securing Your Organisation’s Office 365 Environment

If your business uses O365 or is considering migrating to the service, here’s some top tips to help keep your business secure. By Chester Avey.

2019-08-21

Over 60% of Enterprises Fail to Build Effective Cloud Security

Over half of organisations are using cybersecurity methods that fail to keep pace with the changes and up-grades that their cloud security requires.

2019-08-20

Home Working Can Often Be A Security Threat

The security lapses employees may make when working from remote locations represent one of the largest cybersecurity threats to business.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Oxygen Forensics

Oxygen Forensics

Oxygen Forensics offer the most advanced forensic data examination tools for mobile devices and cloud services.

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

Uniken

Uniken

Uniken REL-ID is a safe, simple, and scalable security platform that tightly integrates your identity, authentication, and channel security.

Claroty

Claroty

Claroty was conceived to secure and optimize OT networks that run the world’s most critical infrastructures.

Wibu-Systems

Wibu-Systems

Wibu-Systems is a leading provider of solutions for the Digital Rights Management (DRM) and anti-piracy industry.

Oxford BioChronometrics

Oxford BioChronometrics

By building profiles based on electronically Defined Natural Attributes, or e-DNA, Oxford BioChronometrics protects digital networks, communities, individuals and other online assets from fraud.

Cyber Security Austria (CSA)

Cyber Security Austria (CSA)

Cyber Security Austria (CSA) is an independent non-profit association with the aim to address security issues in the area of IT/cyber security of critical/strategic infrastructures in Austria.

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

CIRISK

CIRISK

CIRISK offers a wide range of services from consulting to audit or project management to help you develop your cyber security or information security strategy.

972VC

972VC

972VC was created to help entrepreneurs find potential funding for their startups. Your guide to the Israeli startup funding ecosystem.

Kiuwan

Kiuwan

Kiuwan provide software security solutions with SAST and SCA source-code analysis that fit into your DevOps process.

Mayhem

Mayhem

Mayhem, by ForAllSecure, is a developer-first application and API security testing solution.

Vantea SMART

Vantea SMART

Vantea SMART have decades of experience in cybersecurity resulting in an approach of proactive prevention - Security by Design and by Default.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

GitLab

GitLab

GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate and build software.