BUSINESS > Services > IT & Telecoms


« Back to News

2018-03-23

Russia Can Disconnect From The Internet

Russia has prepared the infrastructure to support a digitally isolated state, capable of operating independently from the World Wide Web.

2018-03-23

About Strategic Threat Intelligence

Threat Intelligence informs you about potential malicious activity and helps you make better decisions about prevention of damaging attacks.

2018-03-19

Ensure Your Cloud Storage Is Compliant With GDPR

Its not just EU organisations: If your website captures visitors’ IP addresses and you have five a year from European countries, GDPR affects you.

2018-03-07

Which Phishing Messages Have A Near 100% Click Rate?

Training employees to spot phishing emails, messages and phone calls needs to be frequent if the organisation wants to see click rates decrease.

2018-03-02

Blockchain & Cryptocurrency May Soon Underpin Cloud Storage

Decentralised storage platforms using blockchain technology see an opportunity to compete with the Cloud big boys like AWS and Microsoft's Azure.

2018-02-26

FBI, CIA & NSA Officials Agree: Stay Away From Huawei Phones

Without disclosing hard evidence, the US intelligence establishment are united in accusing the Chinese telecoms giant of cyber espionage.

2018-02-23

Cybersecurity Is A Job for CEOs, Not Just The IT Team

Cyber attacks on business pose real dangers to the bottom line and corporate reputation. They must be dealt with first-hand in the boardroom.

2018-02-15

What is the Industrial IoT?

The IIOT connects machines and devices in industries across transportation, power and healthcare. The potential is high and so are the risks.

2018-02-06

Alphabet Launches A Cybersecurity Company - Chronicle

Alphabet, the parent company of Google, Nest, Waymo, and many other companies, is launching a cybersecurity startup.

2018-01-29

Get Serious About Hardware Cybersecurity

Meltdown and Spectre highlight the need to defend against vulnerabilities in embedded hardware for critical infrastructure.

2018-01-18

Cyber Attacks Will Continue to Succeed

Spectre and Meltdown demonstrate weaknesses in current hardware cybersecurity that will force a paradigm shift within the semiconductor industry.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

SI-CERT

SI-CERT

SI-CERT (Slovenian Computer Emergency Response Team) is the national cyber scurity incident response center for Slovenia.

Yubico

Yubico

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts.

Verimuchme

Verimuchme

Verimuchme is a digital wallet and exchange platform to secure, verify and re-use personal information.

IMS Networks

IMS Networks

IMS Networks specializes in the design and management of high criticality networks and telecoms services including network security and Managed Security Services.

iONLINE

iONLINE

iONLINE delivers high quality IT services and solutions to businesses in Azerbaijan.

Bl4ckswan

Bl4ckswan

Bl4ckswan is a Management Consulting firm specialized in the delivery of information security and compliance services.

ShorePoint

ShorePoint

ShorePoint is an elite cybersecurity firm dedicated to improving the cyber resilience of Federal agencies and their missions.

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

TrueFort

TrueFort

TrueFort take an application-first approach that offers comprehensive protection for real-time visibility and analysis, protection and better communication across business, IT, and security teams.

Cira Info Tech

Cira Info Tech

Cira InfoTech’s cyber security and network consulting and managed services deliver unmatched talented resources and capabilities required to design and build an agile and adaptive IT environment.

Dataships

Dataships

We help companies automate their privacy compliance while building healthy, transparent data relationships with their customers.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

ExchangeDefender

ExchangeDefender

ExchangeDefender provides cybersecurity services that secures your company email and data, and guarantees 24/7 email access.

ReachOut Technology

ReachOut Technology

ReachOut is a transformative approach to IT Security, Support, and Guidance. But we’re more than that. We’re passionate IT experts driven to make solutions to your problems.

Odaseva

Odaseva

Odaseva delivers the strongest data security solution for enterprises running on Salesforce, safeguarding confidentiality and integrity of critical business information.