BUSINESS > Services > IT & Telecoms


« Back to News

2017-08-02

Room At The Top For Women In Tech

It is possible for the tech industry, including data and analytics, to increase the number of C-suite women, even starting from a low base?

2017-08-10

Who Is Responsible for Cloud Security?

IT pros want to apply the same level of security to their cloud deployments as to internal resource and true cloud security requires a collaborative effort.

2017-08-11

Dangers Of Betting On Hybrid Cloud

Hybrid cloud’s popularity might prove to be a transitional stage, distracting companies from properly implementing data security.

2017-08-08

88% Feel Vulnerable To Data Threats

Organisations are increasingly aware of the threat posed by data breaches, according to Thales’ 2017 Data Threat Report.

2017-08-04

5G Wireless Technology - Enabling Mobile-Only Networking

5G is about the evolution of cellular from wireline augmentation to wireline replacement, and strategically from mobile-first to mobile-only.

2017-08-03

Microsoft Cloud Earnings Beat Expectations

There's a reason Microsoft founder Bill Gates is still the richest man in the world and it's not because of PCs & software. It's all about the Cloud.

2017-07-31

IoT Is Becoming A Nightmare For IT

The Internet of Things, at its simplest level, is about connecting smart devices but it is far from a simple challenge for IT departments.

2017-07-28

UK National Cyber Security Centre Has Not Certified Kaspersky

Revealed: Britain's National Cyber Security Centre has never certified products from Russian cybersecurity firm Kaspersky Lab.

2017-07-28

Cybersecurity Is More Difficult Than 2 Years Ago

Over 70 percent of cybersecurity and IT professionals believe cybersecurity analytics and operations are more difficult now. What are the reasons?

2017-07-25

Can We Stop Algorithms Telling Lies?

Most important moments where people interact with large bureaucratic systems involve an algorithm in the form of a scoring system. That's a problem.

2017-07-24

Google Wants To Mimic The Human Brain

Google is proposing a template for creating a single machine learning model that can address multiple tasks, emulating human intelligence.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

CERT-PY

CERT-PY

CERT-PY is the national Computer Emergency Response Team for Paraguay.

CyberDef

CyberDef

CyberDef is a consulting company specialising in cyber defence services for small and medium enterprises.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

SlowMist

SlowMist

SlowMist is a blockchain ecosystem security company providing cybersecurity audits and protection for leading digital asset exchanges, crypto wallets, public chains, and smart contracts.

CoverWallet

CoverWallet

CoverWallet combines deep analytics, thoughtful design and state of the art technology to help small businesses with all their insurance needs including Cyber Liability.

High Wire Networks

High Wire Networks

High Wire Network’s Overwatch Managed Security Plaform-as-a-Service offers organizations end-to-end protection for networks, data, endpoints and users.

eSec Forte Technologies

eSec Forte Technologies

eSec Forte Technologies is a CMMI Level-3 ISO 9001-2008, 27001-2013 certified global consulting and implementation company focused on Information Security and Cyber Security.

HighPoint

HighPoint

HighPoint is a leading technology infrastructure solutions provider offering consultancy, solutions and managed services for network infrastructure and cybersecurity.

Code Intelligence

Code Intelligence

Code Intelligence offers a platform for automated software security testing to help developers make their software more robust and secure.

In Fidem

In Fidem

In Fidem specializes in information security management, with a bold approach that views cybersecurity as a springboard to organizational transformation rather than a barrier to innovation.

Truesec

Truesec

TRUESEC has an exceptional mix of IT specialists. We are true experts in cyber security, advanced IT infrastructure and secure development.

Three Wire Systems

Three Wire Systems

Three Wire is a leader in innovative and efficient technology solutions for government agencies and large enterprise corporations.

Vercara

Vercara

Vercara offers a purpose-built, global cloud security platform that provides layers of protection to safeguard businesses’ online presence, no matter where an attack comes from or where it is aimed.

Arakyta

Arakyta

Arakÿta specializes in business strategy, work flow process and IT systems for organizations.

Zeta Sky

Zeta Sky

Zeta Sky offers a full range of IT and cyber-security services for your business.