BUSINESS > Services > IT & Telecoms


« Back to News

2017-05-26

North Korea's Unit 180 Managed WannaCry Attack

Symantec says a hacking group closely tied to North Korea was behind the massive WannaCry attack hitting 200,000 plus computers in 150 countries.

2017-05-26

A Major Development in Deep-Learning

Neurala’s neural network software uses a bio-inspired approach to mimic the way the human brain learns and analyses its environment.

2017-05-23

US Reduces Crime Rates Using Effective IT

Crime has fallen dramatically over the past 20 years, primarily due to the technological changes which have made it harder to commit crime.

2017-05-22

WannaCry Attack Is A Big Wake-Up Call

The ransomware attack highlights a dependence on interconnected technology & the massive challenge to secure the software systems we rely on.

2017-05-16

What Every CISO Needs To Know

Enterprises are under an endless stream of cyber attacks. The sophistication of these attacks is evolving and prioritization is essential.

2017-05-16

Microsoft, Kaspersky & Symnantec Weigh In On WannaCry Ransomware

Top security firms have found evidence linking the WannaCry ransomware to the prolific North Korean Cybergang known as Lazarus Group.

2017-05-22

Rapid Detection Is Key To Cyber Attacks On Business

There are now so many cyberattacks that many enterprises simply accept that hackers and bad actors will find ways to break into their systems.

2017-05-23

What Healthcare CISOs Should Know

Protected health information (PHI) is more lucrative on the dark web than other form of personally identifiable information.

2017-05-24

Google Neutralizes Phishing Scam

Quick Detection & Respone: A phishing scam used Google Docs in an attack against at least 1 million Gmail users.

2017-05-22

The Difference Between Cyberspace & The Internet

The two terms are sometimes used interchangeably, although they have different meanings.

2017-05-16

Threat Intelligence Starter Resources

Creating a threat intelligence capability can be a challenging undertaking and not all companies are ready for it.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

FlashRouters

FlashRouters

FlashRouters offers DD-WRT compatible router models with improved performance, privacy/security options, and advanced functionality.

Consult Hyperion

Consult Hyperion

Consult Hyperion is an independent strategic and technical consultancy specialising in digital identity and secure electronic transactions.

MicroEJ

MicroEJ

MicroEJ is a software vendor of cost-driven solutions for embedded and IoT devices.

WWPass

WWPass

WWPass is a global cybersecurity company that provides password-less authentication and client-side encryption technology.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

ADGS

ADGS

ADGS is a deeptech company focused in the fields of Agent-Based simulations (Emergent Behavior), Cybersecurity and Biometrics, Social Dynamics, Natural Language Processing and Artificial Intelligence.

DTS Systeme

DTS Systeme

DTS Systeme is an IT service provider with a focus on the core areas of datacenter, technologies and IT security.

OpenAVN (DefenseArk)

OpenAVN (DefenseArk)

Defending your life online, keeping your data safe and private. We detect digital threats magnitudes faster than the leading antivirus software.

Charles IT

Charles IT

Charles IT is your friendly, no-nonsense IT team focused on helping companies make their technology work for them. We focus on building relationships that deliver results.

link22

link22

link22 offers a high level of expertise within IT security and system solutions. We help public and private actors with highly secure IT-solutions.

Think|Stack

Think|Stack

Think|Stack is a managed IT services company specializing in cloud and cybersecurity with human-centered design.

Diversified Search Group - Alta Associates

Diversified Search Group - Alta Associates

Diversified Search Group is an industry leader in recruiting diverse, inclusive and transformational leadership for clients.

TrustMe

TrustMe

TrustMe’s integrated platform for business trust and resilience keeps organizations safe, secure, and trustworthy.

RunReveal

RunReveal

RunReveal's mission is to make sure no breach goes undetected. That means having a product that is accessible and effective for companies of all sizes.

Defence Labs

Defence Labs

Defence Labs is a cybersecurity company specialising in cost effective penetration testing for small-to-medium sized enterprises.

Tundra Managed Solutions

Tundra Managed Solutions

Tundra Managed Solutions is a comprehensive IT services division offering a wide range of managed solutions designed to meet the diverse needs of businesses.