BUSINESS > Services > IT & Telecoms


« Back to News

2018-01-16

Inside the Intel Chip Security Problem

Technology companies are still scrambling to fix serious security flaws affecting computer processors built by Intel and other chipmakers.

2018-01-11

Smartphone Password Vulnerability Discovered

The sensors that make your mobile device smart can also render it vulnerable.

2018-01-05

UK Cybersecurity Firm Sophos Is Trouncing Silicon Valley

Shares in Sophos have more than doubled in price in the last year, outpacing well-known US rivals. What is going on?

2018-01-05

Major Chip Flaws Confirmed

Intel and ARM have discovered two significant embedded vulnerabilities in the microprocessors they manufacture which power many millions of devices.

2018-01-03

British IT Bosses Fear Sophisticated Cyber Threats

Organisations need to wake up and realise that enhancing digital capabilities is about enabling people, not the sole responsibility of IT departments.

2017-12-20

Digital Risks Are Changing And CSOs Must Adapt

CSOs must expand their reach to not only monitor tangible risks, but also address the uninsured risks that live in the digital world.

2017-12-19

Google To Open An AI Centre In Beijing

Google's search engine is blocked in China, yet both have ambitions to become AI superpowers and that's enough to overcome their differences.

2017-12-18

Russia Will Build A Separate Internet Directory

The Russian government plans to build an “independent internet” for BRIC nations as an alternative to the global Domain Name System .

2017-12-18

Undersea Telecoms Cables Are Interception Targets

Undersea cables carrying vital data are essential to modern communications but lack both physical and legal protections. That's a problem.

2017-12-14

Botnets Are Here To Stay

Botnets work by infecting connected devices with malware, then managing them using a command and control server. The results can be devastating.

2017-12-12

Cisco & INTERPOL: Working Against Cybercrime

INTERPOL and IT giant Cisco agree to share data for quick threat detection worldwide and prepare for potential future collaboration in training.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

a1qa

a1qa

a1qa specializes in the delivery of full-cycle software QA and application testing services.

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

Cyber Security Academy (CSA)

Cyber Security Academy (CSA)

The CSA aims to educate professionals who wish to contribute to strengthening the digital defensibility of states, organisations and individual citizens.

nexSecurity

nexSecurity

neXSecurity is an IT and Information security consulting company with more than 2 decades worth of software development and security experience.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

Technisanct

Technisanct

Technisanct works with Governments, especially Law Enforcement and Defence agencies, helping them in monitoring threats, managing their data and resolving their forensic needs.

Cloud Seguro

Cloud Seguro

Cloud Seguro are leaders in the development of cloud solutions, Ethical Hacking, Privacy and Information Security.

Schillings

Schillings

Shillings defends your rights to privacy, reuptation and security. We fight passionately against breaches of your privacy, attacks on your reputation and threats to your security.

Dropzone AI

Dropzone AI

Dropzone AI are creating a generational leap in SecOps by using AI to automate cyber expertise and tooling.

The Cyber Scheme

The Cyber Scheme

The Cyber Scheme provides NCSC certified and assured assessments, training and career support for security testers & technical cyber professionals.

APIsentry

APIsentry

APIsentry is a leading provider of comprehensive API security solutions, specializing in protecting organizations from a wide range of cyber threats targeting their Application Programming Interfaces.