BUSINESS > Services > IT & Telecoms


« Back to News

2017-08-17

Cloud Portability Is Still Science Fiction

Enterprises want cloud portability, but the amount of work and money needed effectively prohibit them from moving in that direction.

2017-08-10

CEOs Are Accountable For Cyber Attacks

Tripwire says CEOs should be aware of the "basic principles of security," and in a survey of Infosecurity 2017 attendees, 40% of them agreed.

2017-08-08

The Rise Of The Introvert: Is There An IT Personality?

Clichés about introverted personality types dominate jokes about the IT, security and espionage professions. Is there any truth in the stories?

2017-08-02

Room At The Top For Women In Tech

It is possible for the tech industry, including data and analytics, to increase the number of C-suite women, even starting from a low base?

2017-08-10

Who Is Responsible for Cloud Security?

IT pros want to apply the same level of security to their cloud deployments as to internal resource and true cloud security requires a collaborative effort.

2017-08-11

Dangers Of Betting On Hybrid Cloud

Hybrid cloud’s popularity might prove to be a transitional stage, distracting companies from properly implementing data security.

2017-08-08

88% Feel Vulnerable To Data Threats

Organisations are increasingly aware of the threat posed by data breaches, according to Thales’ 2017 Data Threat Report.

2017-08-04

5G Wireless Technology - Enabling Mobile-Only Networking

5G is about the evolution of cellular from wireline augmentation to wireline replacement, and strategically from mobile-first to mobile-only.

2017-08-03

Microsoft Cloud Earnings Beat Expectations

There's a reason Microsoft founder Bill Gates is still the richest man in the world and it's not because of PCs & software. It's all about the Cloud.

2017-07-31

IoT Is Becoming A Nightmare For IT

The Internet of Things, at its simplest level, is about connecting smart devices but it is far from a simple challenge for IT departments.

2017-07-28

UK National Cyber Security Centre Has Not Certified Kaspersky

Revealed: Britain's National Cyber Security Centre has never certified products from Russian cybersecurity firm Kaspersky Lab.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Performanta

Performanta

Performanta offer a consultative approach to people, process and technology, focusing on security projects in line with adversarial, accidental and environmental business risk.

Wallix

Wallix

Wallix is a software company offering privileged access management solutions for enterprises, public organizations and cloud service providers

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

SecuGen

SecuGen

SecuGen is a leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

Nullcon

Nullcon

Nullcon provides an integrated platform for exchanging information on the latest attack vectors, zero-day vulnerabilities and unknown threats.

Business Continuity

Business Continuity

Business Continuity delivers integrated IT solutions for cybersecurity, virtualization, cloud platforms and operational security solutions.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

ZecOps

ZecOps

ZecOps is a cybersecurity automation company offering solutions for servers, endpoints, mobile devices, and custom devices.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

ScienceSoft

ScienceSoft

ScienceSoft is a provider of software development and IT consulting services including Information Security.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

NANO Corp

NANO Corp

At NANO Corp, we keep your network visible, understandable, operational and secure with state-of-the-art technology.

Sababa Security

Sababa Security

Sababa Security is the first Italian innovation cyber security vendor, that provides security products, training, and managed services to protect diverse IT and OT environments.

Verosint

Verosint

Verosint (formerly 443ID) provides real-time account fraud prevention that reveals fraudsters hiding in user accounts and proactively blocks them before their attacks can cause harm.

CQURE

CQURE

CQURE is divided into four main cybersecurity excellence areas: CQURE Consulting, CQURE Academy, CQURE Knowledge Sharing and CQURE Cyber Lab.