BUSINESS > Services > IT & Telecoms


« Back to News

2017-02-10

Yahoo Spins A Cautionary Tale Dealing With Data Privacy

Why did it take so long for the Yahoo! hack to come to light? Opinion by Emily Taylor & Joyce Hakmeh

2017-02-21

Female Role Models & The Early Days Of Computing

EDSAC was one of the first computers, developed to undertake complex astronomical calculations. And one of the first users was Dr. Jilly Wheeler.

2017-02-21

The Cyber Security Landscape: A Frightening Picture

The experts at the Institute for Critical Infrastructure Technology paint a frightening picture of the information security landscape.

2017-02-20

Is There A Truly Secure Messaging App?

More messaging apps than ever support end-to-end encryption. Should they prioritize convenience or security?

2017-02-18

Old IT Networks Stop New IoT Innovation

The Internet of Things (IoT) isn’t all brand-new, cutting-edge technology. In fact, some of it’s already suffering through painful upgrade cycles.

2017-02-16

Browser Autofill Can Be Used To Steal Data

Your browser or password manager’s autofill might be giving away your information to phishers using hidden text boxes on websites.

2017-02-14

Non-Secure IoT Devices Are Powerful Weapons

The experts at ICIT think the future of IoT devices needs to be secured by designing in and embedding security features from the bottom up.

2017-02-07

Botnets Have Infiltrated The Twitterverse

Twitter bots produce spam, provide fake followers and can manipulate debates and public opinion in insidious ways that are hard to track and prevent.

2017-02-01

Kaspersky Lab Employee Arrested On Treason Charges

A leading cybercrime investigator at top security firm Kaspersky Lab has been arrested in Russia where he could face charges for high treason.

2017-01-20

Yahoo’s Big Breach Is A Catalyst for Change

Yahoo’s latest security breach where hackers stole personal details from a billion users has the potential to become the biggest attack in history.

2017-01-24

2017: Cybersecurity At A Turning Point

Cybersecurity threats are becoming more intelligent, autonomous and difficult to detect, creating an urgent need for accountability.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

LRQA

LRQA

LRQA is an award-winning global provider of cybersecurity services, bringing innovative thought leadership to the ever-evolving cybersecurity marketplace.

Lawley Insurance

Lawley Insurance

Lawley is a full-service, independent insurance agency. Specialty insurance products include Cyber Security.

Computer Forensic Services

Computer Forensic Services

Computer Forensic Services are digital evidence specialists. Practice areas include Information Security, e-Discovery, Law Enforcement Support and Litigation.

Compnet

Compnet

Compnet is a service company that assists customers in integrating complete ICT systems including network infrastructure and security solutions.

Trustless Computing Association (TCA)

Trustless Computing Association (TCA)

TCA is is a non-profit organization promoting the creation and wide availability of IT and AI technologies that are radically more secure and accountable than today’s state of the art.

Carbonite

Carbonite

Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters.

Bessemer Venture Partners (BVP)

Bessemer Venture Partners (BVP)

Bessemer Venture Partners was born from innovations that literally forged modern building and manufacturing. Today, our team of investors works with people who want to create revolutions of their own.

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

SHIELD

SHIELD

SHIELD are the world’s leading cybersecurity company specializing in cyber fraud and identity solutions.

TAV Technologies

TAV Technologies

TAV Technologies is a provider of technology services to the aviation industry in areas including airport infrastructure systems, digital transformation and cybersecurity.

Veratad Technologies

Veratad Technologies

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions.

CyberUK

CyberUK

CYBERUK is the UK government’s flagship cyber security event and the authoritative event for the UK’s cyber security community.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

Yondu

Yondu

Yondu empowers businesses across various industries through a wide array of innovative technology solutions to help them scale in the new digital economy.

CyberMindr

CyberMindr

CyberMindr is a SaaS platform for Automated & Continuous Attack Path and Threat Exposure Discovery helps you to proactively identify & assess your attack surface to mitigate associated threats.