BUSINESS > Services > IT & Telecoms


« Back to News

2016-09-28

Encryption Gives Malware a Perfect Place to Hide

Nearly half of cyber-attacks this year have used malware hidden in encrypted traffic to evade detection.

2016-09-26

How To Use Cybersecurity Big Data Effectively

A survey of US Federal Agencies finds that the sheer volume of cybersecurity data is overwhelming and that most of it goes unused.

2016-09-26

Delete/Never-Use Google Allo: Says Snowden

Edward Snowden has warned people not to use Google’s new chat app, because it lets the company read everything that they say.

2016-09-26

Managing Cyber Risk

Effective cybersecurity depends on humans and artificial machine intelligence working together to protect businesses, institutions and communities.

2016-09-21

You Have Big Data, Or Perhaps Just Too Much Data?

There is more data available to organisations today than ever before. Is it all really useful?

2016-09-20

Cloud-Based Malware Now Delivers Ransomware

Concerns over ransomware are growing and a new study finds that nearly half of all cloud-based malware now delivers ransomware applications.

2016-09-16

Delete Google Maps But They'll Still Track You

Google, it seems, is very, very interested in knowing where you are at all times.

2016-09-15

Artificial Intelligence & The Future Of Cybersecurity

AI can be used to detect threats, including those that are yet to be discovered, by identifying shared characteristics within families of threats.

2016-09-13

Yahoo Suspects It Has Suffered A Huge Data Breach

Yahoo is investigating claims the hacker has posted details of 200 million Yahoo accounts to a marketplace on the dark web.

2016-09-14

IBM’s Watson Takes Aim At CyberSecurity

IBM has launched a new cloud-based version of the company’s cognitive technology to tackle the rising challenge of cyber security.

2016-09-06

Red Team: IBM Cyber Security Service Revealed

Despite efforts to find autonomous solutions to cybersecurity, IBM believes that the human factor is still important.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

National Cyber Security Centre Finland (NCSC-FI)

National Cyber Security Centre Finland (NCSC-FI)

The NCSC-FI develops and monitors the operational reliability and security of communications networks and services in Finland.

Qolcom

Qolcom

Qolcom is a leading UK based integrator of secure wireless network and mobile device management solutions.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

Aspen Insurance

Aspen Insurance

Aspen is a leading diversified specialty insurance and reinsurance company. Products offered include cyber insurance.

CybExer Technologies

CybExer Technologies

CybExer provide an on-premise, easily deployable solution for complex technical cyber security exercises based on experience in military grade ranges.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

Mitiga

Mitiga

Mitiga uniquily combines the top cybersecurity minds in Incident Readiness and Response with a cloud-based platform for cloud and hybrid environments.

A&O IT Group

A&O IT Group

A&O IT Group provide IT support and services including IT Managed Services, IT Project Services, IT Engineer Services and Cyber Security.

FiVerity

FiVerity

FiVerity provides financial institutions with cyber fraud defense to combat a dangerous and growing threat - the convergence of fraud-related theft with sophisticated, high-volume cyber attacks.

Trilateral Research

Trilateral Research

Trilateral Research provide regulatory and policy advice; develop new data-driven technologies and contribute to the latest standards in safeguarding privacy, ethics and human rights.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

DH2i

DH2i

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

Cyber1

Cyber1

CYBER1 is a leader in cyber security advisory and solutions. We are uniquely placed to help customers achieve cyber resilience and thus, safeguard reputation and value.

Positiwise Software Pvt Ltd

Positiwise Software Pvt Ltd

Positiwise Software offers end-to-end software development solutions to accelerate the digital growth of businesses.