BUSINESS > Services > IT & Telecoms


« Back to News

2018-07-27

Why Is Rural Broadband Access A Problem?

Only 55 percent of people living in US rural areas have access to the broadband speeds that are available to 94 percent of the urban population.

2018-07-24

Hacking Via The Cloud

Chinese hackers launched a big 2017 espionage campaign targeting cloud service supplier’s networks, rather than attacking companies directly.

2018-07-13

Breakthrough Technologies To Combat Insider Threats

Advances in technology have a positive outlook on keeping sensitive data safe. Here are five emerging tools for mitigating insider threats.

2018-07-10

Five Tips To Secure IoT

To make the most of empowering IoT technology, it must be simultaneously optimised to do its job while not exposing personal data.

2018-07-04

US Builds The Fastest Supercomputer. For Now.

The arms race in computing power to drive AI and other complex data processes continues apace as 'Summit' leapfrogs 'Sunways TaihuLight'.

2018-06-26

Chinese Hack Breached US Satellites

Hackers infected computers controlling critical US communications satellites, so that they could change orbital positions and disrupt data traffic.

2018-06-25

White Hat To Combat Cyber-Attacks

The Israeli National Cyber Security Authority is sub-contracting protection of critical infrastructure, sector by sector.

2018-06-22

AI Is Re-Inventing IT

Artificial Intelligence is taking over the IT world, as companies use AI and machine learning to improve tech support & manage infrastructure.

2018-06-21

Security Features of Modern Phishing Prevention Products

The average successful phishing attack costs businesses $1.6m and choosing the right anti-phishing software is a really important decision.

2018-06-20

Five Mistakes US Cyberscurity Vendors Make In The UK

Despite the similarities, many vendors fall at the first hurdle by failing to account for some important differences in the UK market.

2018-06-18

Israeli Cybersecurity Company Beats All Hackers

In a special challenge to hackers Cyber 2.0 offered a cash prize for any hacker able to penetrate the company's online defences.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

PrimaTech

PrimaTech

PrimaTech provide process safety, cyber and process security, and risk management consulting, training and software for the process industries.

Cryptsoft

Cryptsoft

Cryptsoft provides key management and security software development toolkits based around open standards such as OASIS KMIP and PKCS#11.

Seavus

Seavus

Seavus is a software development and consulting company with a proven track-record in providing successful enterprise-wide business solutions including Managed Security Services.

Blancco Technology Group

Blancco Technology Group

Blancco Technology Group is a leading global provider of mobile device diagnostics and secure data erasure solutions.

Assertion

Assertion

Assertion secures your collaboration (UC/CC) systems from cyber risks. Enforcing the right set of controls and monitoring them continually brings down risk to acceptable levels.

Eperi

Eperi

Eperi is a leading provider of Cloud Data Protection (CDP) solutions with 15 years of experience in data encryption for databases, (SaaS) applications and files.

SimSpace

SimSpace

SimSpace is the visionary yet practical platform for measuring how your security system responds under actual, sustained attack.

K2 Cyber Security

K2 Cyber Security

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks.

Netragard

Netragard

Netragard has an established reputation for providing high-quality offensive and defensive security services.

Avancer Corporation

Avancer Corporation

Avancer Corporation is a multi-system integrator focusing on Identity and Access Management (IAM) Technology. Founded in 2004.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

Board of Cyber

Board of Cyber

Board of Cyber offers Security Rating: a fast, non-intrusive, continuous, 100% automated solution to evaluate the cyber performance of an organization.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.

Holiseum

Holiseum

Holiseum delivers innovative cybersecurity solutions for the critical infrastructure organizations, as well as cybersecurity services and consulting.

Atlantica Digital

Atlantica Digital

Atlantica design and create highly innovative software solutions and solid, scalable and secure IT infrastructures for a constantly evolving market.