BUSINESS > Services > IT & Telecoms


« Back to News

2017-03-27

Data Breaches Attack All Parts Of A Business

Be Prepared: Data breaches are an enterprise wide problem involving top managers, legal counsel, HR, PR & other business stakeholders.

2017-02-18

WhatsApp Becomes The Latest Victim

Is there a truly secure messaging app? Attackers could exploit a security vulnerability in WhatsApp to snoop on its users.

2017-02-20

How To Automate Cyber Defense

Humans aren’t fast enough to respond to network attacks and breaches. Machines can help us, if we help them.

2017-03-17

Data Realities: 2017 & Beyond

Data Matters: A critical driving force in the global economy will be data exploitation, data value creation, data-sharing & data protection.

2017-03-17

Google's New AI System Unscrambles Pixelated Faces

Google reveals a new AI system capable of “enhancing” an eight-pixel square image, increasing the resolution x 16-fold to restore lost data.

2017-02-28

Tech Companies Oppose Trump’s Travel Ban

SpaceX and Tesla are the latest to join the ranks of technology firms officially opposing the migrant ban imposed by the President Trump

2017-03-01

Fake Microsoft Phishing Scam

Access to your Microsoft Email Account Disabled? A campaign of fraudulent messages designed to capture your online identity via a fake website.

2017-02-10

Yahoo Spins A Cautionary Tale Dealing With Data Privacy

Why did it take so long for the Yahoo! hack to come to light? Opinion by Emily Taylor & Joyce Hakmeh

2017-02-21

Female Role Models & The Early Days Of Computing

EDSAC was one of the first computers, developed to undertake complex astronomical calculations. And one of the first users was Dr. Jilly Wheeler.

2017-02-21

The Cyber Security Landscape: A Frightening Picture

The experts at the Institute for Critical Infrastructure Technology paint a frightening picture of the information security landscape.

2017-02-20

Is There A Truly Secure Messaging App?

More messaging apps than ever support end-to-end encryption. Should they prioritize convenience or security?

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

Censornet

Censornet

Censornet's autonomous, integrated cloud security gives mid-market organisations the confidence and control of enterprise-grade cyber protection.

Gurucul

Gurucul

Gurucul predictive security analytics protects against insider threats, account compromise and data exfiltration on-premises and in the cloud.

CyberDefcon

CyberDefcon

CyberDefcon is an independent organization dedicated to the pursuit of making the internet a safer place.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

MXC Security

MXC Security

MXC designs and delivers corporate-wide information security management system with our full-time IRCA Accredited consulting team.

Redstor

Redstor

Redstor's complete data management helps you discover, manage and control your data from a single control centre, unifying backup and recovery, disaster recovery, archiving and search and insight.

AUREA Technology

AUREA Technology

The photon counter SPD_OEM_NIR from AUREA Technology is designed for quantum key distribution at telecom wavelengths.

Secure Digital Solutions (SDS)

Secure Digital Solutions (SDS)

Secure Digital Solutions is a leading consulting firm in the business of information security providing cyber security program strategy, enterprise risk and compliance, and data privacy.

HMS Networks

HMS Networks

HMS stands for Hardware meets Software. Our technology enables industrial hardware to communicate and share information with software and systems.

Yogosha

Yogosha

Yogosha is a crowdsourced cybersecurity platform enabling a win-win collaboration with the most talented hackers to detect and fix vulnerabilities on your most critical systems.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.

EkoCyber

EkoCyber

EkoCyber partner with businesses as a value-added MSSP to provide top-tier, trusted and transparent cyber security services at an affordable price point.

Permiso Security

Permiso Security

Permiso combines industry leading Identity Security Posture Management with Identity Threat Detection and Response, leaving no place to hide for identity threats lurking in your environment.