BUSINESS > Services > IT & Telecoms


« Back to News

2019-03-20

Knowing How Your Data Behaves Is The Key To Cybersecurity

Data is everywhere, however, securing that data has never been more critical, or more difficult. This means we need a new approach to security.

2019-03-17

US Allies Don’t Agree With Trump Blocking Huawei

The Trump administration's push to block Chinese firm Huawei from their next-generation 5G wireless networks is facing skepticism in Europe.

2019-03-12

Huawei 5G Risk Can Be ‘Contained’

Britain's spy agencies believe the threat of espionage arising from Huawei's 5G engineering and security capabilities can be managed.

2019-03-07

What Is Data Fusion?

Big Data is all around us, in every field of life. But in spite of the far-reaching advantages, obvious clues frequently hide in a sea of unrelated data.

2019-02-21

IoT Is In The Dark When It Comes To ePrivacy

As if GDPR wasn’t enough of a challenge, the new ePrivacy regulation is set to shake things up massively when it comes to the Internet of Things.

2019-03-04

Facebook Has Changed Computing

Many of the apps and services we use every day are built with technologies that Facebook developed and then shared with the world.

2019-02-20

Apple ‘Subscription Confirmation’ Phishing Scam

Apple users should be alert to a new phishing scam designed to trick them into handing over personal financial information to online criminals.

2019-02-19

Russia May Disconnect From The Internet

Russia wants the capability to isolate its own internet from the rest of the world and is testing the ways to insulate its networks from external access.

2019-02-19

Cloud Based Technology For Policing

Cloud-based technology can be an effective tool helping law enforcement modernise work practices and better respond to changing societal issues.

2019-02-15

NASA's Daily Shutdown Threat

NASA faced daily cybe rsecurity threats during the US government's 35-day partial shutdown and these could re-emerge with a new shutdown.

2019-02-13

White Hat Female Hacker Leads The Way

The CEO of LMG Security is one of a small but powerful group of women rising to the top in the fast-growing cybersecurity industry.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

E-Tech

E-Tech

E-Tech has been providing system support and information technology consulting services including Internet and Network Security assessments.

Zentera Systems

Zentera Systems

Zentera's CoIP (Cloud over IP) solution offers enterprise-grade networking and security for the emerging cloud ecosystem.

Uniscon

Uniscon

Uniscon is a leading provider of cloud security solutions in Europe.

Clearswift

Clearswift

Clearswift is trusted by businesses, governments and defense organizations globally for its Adaptive Cyber Security and Data Loss Prevention solutions.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

Cask Government Services

Cask Government Services

Cask Government Services focuses on program management, cybersecurity, logistics, business analysis and engineering services for Federal, State and Local Government.

Ataya & Partners

Ataya & Partners

Ataya & Partners is a consulting company that delivers data protection, cybersecurity and IT & Digital governance services.

CultureAI

CultureAI

CultureAI deliver intelligent cyber security awareness education and tools that build resilient security cultures where employees help defend.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

AUREA Technology

AUREA Technology

The photon counter SPD_OEM_NIR from AUREA Technology is designed for quantum key distribution at telecom wavelengths.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

Ministry of Electronics & Information Technology (MeitY) - India

Ministry of Electronics & Information Technology (MeitY) - India

The Ministry of Electronics & Information Technology is an executive agency responsible for IT policy, strategy and development of the electronics industry.

ViewDS Identity Solutions

ViewDS Identity Solutions

ViewDS Identity Solutions develops innovative identity software including cloud identity management solutions, directory services, access and authorization management solutions.

Clutch Security

Clutch Security

Clutch Security are on a mission to secure all Non-Human Identities. Everywhere.