BUSINESS > Services > IT & Telecoms


« Back to News

2018-12-27

Cybersecurity 2019: Predictions You Can’t Ignore

Threat actors are not being deterred; expect more intensified and ever more sophisticated attacks in 2019.

2018-12-05

GCHQ Doesn't Always Tell Vendors If Their Software Is Vulnerable

GCHQ has a special team to search for flaws in different types of computer software and systems. They don't always disclose what they find.

2018-11-21

Stuxnet 2.0 - Iran Says Israel Has Launched New Cyber Attacks

Iran’s chief of civil defense recently claimed that the Iranian government had fought off what he described as a new version of Stuxnet.

2018-11-23

Russian Cyber Security Firm Kaspersky Moves Away From Moscow

Kaspersky Lab is moving key parts of its business out of Moscow to address risks arising from its exposure to the Russian intelligence services.

2018-11-16

China Exports Cyber Surveillance To Africa

China is ramping up exports of facial recognition technology and online surveillance techniques abroad, especially in Africa.

2018-11-16

Don't Underestimate The Impact Of Phishing

Most companies lack adequate safeguards against phishing threats and its not just about emails.

2018-11-14

Darktrace Describe The Alarming Future AI Attack Scenario

AI-driven malware that will self-propagate via a series of autonomous decisions, intelligently tailored to the parameters of the infected system.

2018-11-09

Microsoft Wants To Work with Trump & Congress On Cybersecurity

Bipartisan: Despite a newly divided US Congress, Microsoft is looking for ways to create a global force-field against cybersecurity threats.

2018-11-08

China May Be Reading Your Emails

Someone in Beijing may be reading your emails before you do, as well as capturing your passwords & personal data from websites you visit

2018-11-02

Pay-As-You-Go Cybersecurity

Shifting from a monolithic, high investment, capex-based cybersecurity model to an on-demand, pay-as-you-go one is clearly the way of the future.

2018-10-31

British Refuse To Co-operate With Belgian Hacking Inquiry

The UK refusal to cooperate with an inquiry into GCHQ’s alleged hacking of Belgacom could damage diplomatic relations with NATO partners.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

InfoSecurity Magazine

InfoSecurity Magazine

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry.

limes datentechnik

limes datentechnik

limes datentechnik is an authority in the fields of cryptography and data compression. The FLAM product family is an internationally accepted standard for efficient and safe handling of data.

Halon

Halon

Halon is a flexible security and operations platform for in-transit email.

Vesta

Vesta

Vesta Corporation is a global provider of a scalable suite of fraud and payment solutions for online commerce.

CIRISK

CIRISK

CIRISK offers a wide range of services from consulting to audit or project management to help you develop your cyber security or information security strategy.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

The Security Company (TSC)

The Security Company (TSC)

The Security Company is a leading provider of creative employee security awareness programmes.

AVANTEC

AVANTEC

AVANTEC is the leading Swiss provider of IT security solutions in the areas of cloud, content, network and endpoint security.

Cyber Risk International

Cyber Risk International

Cyber Risk International offer CyberPrism, a B2B SaaS solution that empowers businesses to perform a self-assessment of their cyber security program.

JanBask Training

JanBask Training

JanBask Training is a dynamic, highly professional, global online training provider committed to propelling the next generation of technology learners with a whole new way of training experience.

Aegis9

Aegis9

Aegis9 is an Australian owned and sovereign consultancy that specialises in providing tailored security solutions for both public and private sector clients based on their specific needs.

Cybersecurity Elastic Laboratory (CEL)

Cybersecurity Elastic Laboratory (CEL)

CEL specialize in providing top-tier services in vulnerability diagnosis and penetration testing, offering a comprehensive suite of solutions to mitigate cyber risks.

HanaByte

HanaByte

HanaByte is a security consultancy focused on delivering state of the art solutions in the cloud. We specialize in delivering cloud services with an emphasis on security.

Defend

Defend

DEFEND are 100% focused on providing managed cybersecurity solutions and services that make a real difference to the cyber resilience of your organisation.

VCI Global

VCI Global

VCI Global is a diversified holding company. Through its subsidiaries, it focuses on consulting, fintech, AI, robotics, and cybersecurity.

CQURE

CQURE

CQURE is divided into four main cybersecurity excellence areas: CQURE Consulting, CQURE Academy, CQURE Knowledge Sharing and CQURE Cyber Lab.