BUSINESS > Services > IT & Telecoms


« Back to News

2017-11-17

DDoS Attack? There Is An App For That.

Security expert Brian Krebs tells the story of Ragebooter, a Denial of Service App that is readily available to Android users.

2017-11-15

US Data Systems Under Attack

US Homeland Security issue a warning that the nuclear, energy, aviation, water and critical manufacturing industries are targeted by hackers.

2017-11-10

Tech Giants Face US Congress Over Russia Election

A showdown between Congress and the powerful social media companies that have helped define the current unsettled age in western democracies.

2017-11-13

All WiFi Networks Are Vulnerable to Hacking

The security protocol protecting the vast majority of WiFi connections has been broken, exposing wireless Internet traffic to eavesdroppers.

2017-11-16

Unstructured Data: Threats You Cannot See

Structured data is only a small portion of a larger, more complicated puzzle. Security teams struggle to identify, collect & analyse unstructured data.

2017-11-08

NotPetya Much Worse Than WannaCry

NotPetya was 2017's most damaging ransomware attack,beating notable campaigns such as Locky and WannaCry, according to malware experts.

2017-11-06

Russia Provides New Internet Connection to N.Korea

A major Russian telecommunications company appears to have begun providing an Internet connection to North Korea.

2017-11-01

Microsoft Cloud Is Hosting US Spy Data

Outsourced: Microsoft’s secret cloud is a physically isolated infrastructure located in a secure facility operating under cleared personnel.

2017-10-31

Microsoft Chief Says N. Korea Was Behind 'WannaCry'

Brad Smith confirms N. Korea was behind the devastating WannaCry ransomware attack that temporarily crippled UK Healthcare organisations.

2017-10-27

Facial Recognition Works on iPhone X. Sometimes.

The iPhone X might be the future of Apple’s smartphone design but its innovative Face ID struggles with under 13s, siblings or twins.

2017-10-27

Postmortem: WannaCry Ransomware Explained

WannaCry ransomware consists of multiple components infecting Windows operating systems. But the speed of its spread is something special.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

Cyber Risk Agency

Cyber Risk Agency

Cyber Risk Agency is a cybersecurity consulting firm specializing in managing cyber risks for SMEs.

2Secure

2Secure

2Secure is one of Sweden's largest private security companies. Service inlcude personal security, corporate security, information and cyber security.

Kudelski Security

Kudelski Security

Kudelski Security is an international cybersecurity company providing innovative, independent and tailored security solutions for large enterprise and public sector clients.

Digittrade

Digittrade

Digittrade develop and produce external encrypted hard disks and secure communications apps.

PROOF

PROOF

PROOF is a Brazilian leader in cybersecurity. Our goal is to assist our Customers in managing security efficiently and in tune with business needs.

CybExer Technologies

CybExer Technologies

CybExer provide an on-premise, easily deployable solution for complex technical cyber security exercises based on experience in military grade ranges.

Mendoza Ventures

Mendoza Ventures

Mendoza Ventures is a venture capital fund focusing on pre-seed Artificial Intelligence (AI), Fintech, and Cybersecurity startups.

NanoVMs

NanoVMs

NanoVMs is the industry's only unikernel platform available today. NanoVMs runs your applications as secure, isolated virtual machines faster than bare metal installs.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

AB Handshake

AB Handshake

AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

Questex Asia Total Security Conference

Questex Asia Total Security Conference

Questex Asia’s Total Security Conferences is one of the industry’s most prestigious and engaging forums for the region's top information security leaders and business decision-makers.

AWARE7

AWARE7

IT security for human and machine. With the help of our products and services, we work with you to increase the IT security level of your organization.