BUSINESS > Services > IT & Telecoms


« Back to News

2018-10-30

IBM Spends $34B To Buy Red Hat

Older technology companies like IBM are turning to deal-making to gain scale and fend off competitors in cloud computing.

2018-10-26

Facebook Wants To Buy A Cybersecurity Firm. Which One?

Facebook quickly wants to get its hands on security tools that will easily integrate with its current services and has a big acquisition in mind.

2018-10-26

Microsoft, Amazon CEOs Vow To Continue Defense Work

Google’s decision not to bid for the Pentagon’s $10 billion JEDI cloud contract draws criticism from CEOs of rival tech companies.

2018-10-29

Cybersecurity + Blockchain = Big Progress

Blockchain-powered cybersecurity solutions which address a range of pressing challenges are happening now and they’re showing real promise.

2018-10-26

New Partnership To Combine Cyber AI And Forensics

Darktrace and Endace have announced a partnership that combines Darktrace's cyber AI with Endace's forensic capabilities.

2018-10-24

New iPhone Bug Gives Anyone Access To Your Photos

A recently discovered bug in iOS 12 allows attackers with physical access to your iPhone to access your contacts and photos.

2018-10-18

Mobile Security Threats Put Businesses At Risk

A significant lack of visibility into non-corporate devices and networks is putting businesses at risk of data leakage and phishing attacks.

2018-10-22

Routers With Weak Passwords Will Soon Be Illegal In California

A new California law would make it illegal to sell Internet-connected devices that aren’t equipped with a unique password.

2018-10-12

Neither US Or UK  Investigated Chinese Spy Chips

Apple, Amazon and Super Micro strongly deny a bombshell report about implanted spy chips and they are supported by the DHS and the NCSC.

2018-10-08

China Compromises Tech Companies With Malicious Microchips

Has the Chinese military really implanted malicious microchips in motherboards used by almost 30 US companies and intelligence agencies?

2018-10-09

Secret Military Technology Now On Your Smartphone

Hawkeye 360 radio signal identification and tracking allows cell phone companies to better understand their customer locations and usage.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

Charlton Networks

Charlton Networks

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies.

Zentera Systems

Zentera Systems

Zentera's CoIP (Cloud over IP) solution offers enterprise-grade networking and security for the emerging cloud ecosystem.

CionSystems

CionSystems

CionSystems provides identity, access and authentication solutions to improve security and streamline IT infrastructure management.

Minerva Labs

Minerva Labs

Minerva’s patent pending solution keeps malware in a constant sleep state before it can infiltrate your network and cause any damage.

Privitar

Privitar

Privitar is leading the development and adoption of privacy engineering technology enabling our customers to innovate and leverage data with an uncompromising approach to data privacy.

Wallarm

Wallarm

Wallarm is the only unified, best-in-class API Security and WAAP (Web App and API Protection) platform to protect your entire API and web application portfolio.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

Cequence Security

Cequence Security

Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection.

Sponge

Sponge

Sponge is a world-renowned digital learning provider on a mission to make learning unforgettable.

Cyber Security Advisor

Cyber Security Advisor

Notice how sophisticated the cybersecurity market is. Think how would you pick the security provider, assess your company, and be sure of your security decisions? Cyber Security Advisor is the answer!

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

Zokyo

Zokyo

Zokyo is a venture studio that builds, secures, and funds legendary web3/crypto businesses.

Aunalytics

Aunalytics

Aunalytics is a data platform company that delivers insights as a service to answer your most important IT and business questions.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

BB2 Technology Group

BB2 Technology Group

BB2 Technology Group offers managed IT services for businesses nationwide with 24/7 support.