BUSINESS > Services > IT & Telecoms


« Back to News

2016-06-29

Charge Companies for Cyber Security Failures

British MPs recommended that companies should be fined if they fail to guard against cyber-attacks, following last year's TalkTalk hack.

2016-06-17

The Death of the Password Is Upon Us

The traditional password is losing its foothold as the standard in authentication.

2016-06-15

Harvard Business School Wants To Know How To Win At Cybersecurity

HBS graduates now running cybersecurity companies discuss the lessons they have learned and identify some solutions.

2016-06-09

The FBI Is Looking For A Fight Over Encryption

After the public dispute with Apple over iPhone access the FBI is now bracing for a battle involving encrypted text messages, e-mails & other data.

2016-06-10

Microchips Enter A New Era of Power

One Chip To Rule Them All: The key growth driver in hardware could soon be the Internet of Things.

2016-06-07

Unlikely Partners Build High Speed Trans-Atlantic Cable

MAREA: Microsoft and Facebook have recently announced that they are teaming up to build a subsea cable.

2016-06-03

Data Analytics Governance Gets More Important

Companies are wading in and testing the potential of data analytics, but it’s important that they understand the limitations of those analytics.

2016-06-01

Over One Hundred Million LinkedIn Passwords Posted Online

A data set with 117 million LinkedIn members’ emails & passwords has just been dumped.

2016-05-31

Google Implements Neural Network Computing For Machine Learning

Google’s SyntaxNet is an open-source neural network framework that provides a foundation for Natural Language Understanding systems.

2016-05-18

Britain’s Border Control Systems Keep Falling Over

The system that provides a critical additional layer of security by screening all passengers against lists of suspected individuals is not reliable.

2016-05-25

Mobile Spying – What’s Possible, Ethical Or Useful?

Many widely used mobile apps have a legitimate feature - remote mobile monitoring. Is this any different from illegitimate spyware?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CyTech Services

CyTech Services

CyTech provides unique services and solutions complemented with professional subject matter experts to both the Federal and Commercial sectors.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

International Telecommunication Union (ITU)

International Telecommunication Union (ITU)

ITU is the United Nations specialized agency for information and communication technologies – ICTs. Areas of activity include cybersecurity.

CERT-UG/CC

CERT-UG/CC

CERT-UG/CC is the national Computer Emergency Response Team for Uganda, operating under the National Information Technology Authority (NITA-U)

Maverick Technologies

Maverick Technologies

Maverick is an industrial automation, enterprise integration and operational consulting company. Services include industrial cyber security.

Akheros

Akheros

Akheros develops cybersecurity learning algorithms which anticipate, detect and prevent offensive and incongruous behaviors of M2M interactions.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

360 Total Security

360 Total Security

360 company is the largest provider of Internet and mobile security products in China.

DataDome

DataDome

DataDome offers real-time AI protection against all OWASP automated threats, including credential stuffing, layer 7 DDoS attacks, SQL injection & intensive scraping.

Drip7

Drip7

Drip7 is a micro-learning platform that is re-inventing the way companies train their employees and build lasting cultural change around the importance of cybersecurity.

Componolit

Componolit

Componolit GmbH is a highly specialized company with a strong emphasis on trustworthy software, component-based systems and formal verification.

Panacea Infosec

Panacea Infosec

Panacea Infosec is a leading provider of information security compliance services. We help our clients in protecting their data, reducing security risks and fighting cybercrime.

VMware

VMware

VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control.

OneStep Group

OneStep Group

OneStep Group are a leading Australian provider of information and communications technology (ICT) services, connecting businesses through technology solutions and support.

DataGuard

DataGuard

DataGuard is a security and compliance software company trusted by organisations across the globe.

Infodot Technologies

Infodot Technologies

Infodot Technologies specialize in a co-managed IT support and services approach, where businesses share their IT responsibilities with a skilled Managed IT Services Provider (MSP).