BUSINESS > Services > IT & Telecoms


« Back to News

2018-11-09

Microsoft Wants To Work with Trump & Congress On Cybersecurity

Bipartisan: Despite a newly divided US Congress, Microsoft is looking for ways to create a global force-field against cybersecurity threats.

2018-11-08

China May Be Reading Your Emails

Someone in Beijing may be reading your emails before you do, as well as capturing your passwords & personal data from websites you visit

2018-11-02

Pay-As-You-Go Cybersecurity

Shifting from a monolithic, high investment, capex-based cybersecurity model to an on-demand, pay-as-you-go one is clearly the way of the future.

2018-10-31

British Refuse To Co-operate With Belgian Hacking Inquiry

The UK refusal to cooperate with an inquiry into GCHQ’s alleged hacking of Belgacom could damage diplomatic relations with NATO partners.

2018-10-30

IBM Spends $34B To Buy Red Hat

Older technology companies like IBM are turning to deal-making to gain scale and fend off competitors in cloud computing.

2018-10-26

Facebook Wants To Buy A Cybersecurity Firm. Which One?

Facebook quickly wants to get its hands on security tools that will easily integrate with its current services and has a big acquisition in mind.

2018-10-26

Microsoft, Amazon CEOs Vow To Continue Defense Work

Google’s decision not to bid for the Pentagon’s $10 billion JEDI cloud contract draws criticism from CEOs of rival tech companies.

2018-10-29

Cybersecurity + Blockchain = Big Progress

Blockchain-powered cybersecurity solutions which address a range of pressing challenges are happening now and they’re showing real promise.

2018-10-26

New Partnership To Combine Cyber AI And Forensics

Darktrace and Endace have announced a partnership that combines Darktrace's cyber AI with Endace's forensic capabilities.

2018-10-24

New iPhone Bug Gives Anyone Access To Your Photos

A recently discovered bug in iOS 12 allows attackers with physical access to your iPhone to access your contacts and photos.

2018-10-18

Mobile Security Threats Put Businesses At Risk

A significant lack of visibility into non-corporate devices and networks is putting businesses at risk of data leakage and phishing attacks.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Luxar Tech

Luxar Tech

Luxar's network visibility products enable enterprises and service providers to monitor network traffic, improve security and optimize efficiency.

Packet Ninjas

Packet Ninjas

Packet Ninjas is a niche cyber security agency with specialized expertise in the use of digital intelligence to strengthen cyber security.

National Intelligence Service (NIS) - South Korea

National Intelligence Service (NIS) - South Korea

The NIS oversees policy on cyber security in South Korea by formulating and coordinating the execution of such policy and devising necessary schemes and guidelines.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

GLESEC

GLESEC

GLESEC offer a complete range of Cyber Security services from Operations & Intelligence Services to Auditing & Compliance and Simulation and Training.

Cynance

Cynance

Cynance are an award-winning, independent cyber security specialist and part of the Transputec family of companies.

Bedrock Systems

Bedrock Systems

BedRock Systems is on a mission to deliver a trusted computing base from edge to cloud, where safety and security isn’t just a perception, it’s a formally proven reality.

ENSCO

ENSCO

The ENSCO group of companies provides engineering, science and advanced technology solutions that guarantee mission success, safety and security to governments and private industries worldwide.

Auriga Consulting

Auriga Consulting

Auriga is a center of excellence in Cyber Security, Assurance and Monitoring Services, with a renowned track record of succeeding where others have failed.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

Kingston Technology

Kingston Technology

Kingston is a leading global manufacturer of memory and storage solutions including encrypted storage solutions to protect data inside and outside the firewall.

Blackpanda

Blackpanda

Blackpanda is Asia’s premier cyber security incident response group, hyper-focused on digital forensics and cyber crisis response.

Socura

Socura

Socura helps make the digital world a safer place; changing the way organisations think about cyber security through a dynamic, innovative, and human approach.

Cranium

Cranium

Cranium are an international consultancy organisation specialised in privacy, security and data management.

Velstadt Cybersecurity

Velstadt Cybersecurity

Velstadt's team of experienced professionals works on identifying vulnerabilities, analyzing threats, and developing strategies to ensure the highest level of security.

Thero6

Thero6

Thero6 develop dynamic financial analysis algorithms that help prevent coin collapses and theft of cryptocurrency funds by identifying the transaction absolutely throughout the chain.