BUSINESS > Services > IT & Telecoms


« Back to News

2016-04-08

BYOD Security Report

Crowd Research Partners' new report provides a conflicting picture of current BYOD security barriers and adoption trends in the workplace.

2016-04-08

CISO Cyber Communications Breakdown

CISOs and the board of directors are missing the mark when it comes to cybersecurity reporting.

2016-04-05

Cognitive Computing Market Forecast To Be Worth $31Billion In 3 Years

Cognitive computing will drive digital transformation and show explosive growth over the next few years.

2016-04-05

How The CIA Is Making Sense Of Big Data

The CIA’s new spying strategy is to make sense of big data, the technological explosion of connectivity, data sensors, devices & people.

2016-04-04

Four Startup Companies That Are Harnessing AI In The Invisible Cyberwar

Examples of Cybersecurity startups working on automated systems they hope will be more effective than hiring human enterprise security teams.

2016-04-01

Apple's Questionable Victory Over the FBI

Apple has suffered one major casualty in its legal victory over the FBI: bragging rights over the iPhone’s security.

2016-04-04

Cars Really Are Increasingly Vulnerable To Cyberthreats

Modern cars are "increasingly vulnerable" to hacking after researchers proved it is possible to disable brakes and manipulate steering remotely.

2016-04-01

What Do UK Consumers Think About SMEs’ Cyber Security?

KPMG's Small Business Reputation & The Cyber Risk survey gives us valuable information about what consumers think about cyber security.

2016-03-30

TalkTalk Launches Secure Biometric Authentication

TalkTalk has become one of the first major companies to use biometric authentication following last year's £60m data breach.

2016-03-23

NSA Using The Cloud To Thwart The Next Snowden

In a post-Snowden world, is it really a good idea to have analysts swimming around in one vast ocean of NSA secrets and data?

2016-03-28

Big Data: The 4 Layers Everyone Must Know

There are four different stages that data has to pass through from a raw unstructured datum to becoming an actionable insight.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Duane Morris LLP

Duane Morris LLP

Duane Morris is a global law firm with offices in the USA, UK and Asia. Practice areas include Cybersecurity.

Bayshore Networks

Bayshore Networks

Bayshore Networks was founded to safely and securely protect Industrial IoT (IIoT) networks, applications, machines and workers from cyber threats.

National Cyber Security Directorate (DNSC) - Romania

National Cyber Security Directorate (DNSC) - Romania

DNSC (formerly CERT-RO) is the Romanian national cyber security and incident response team.

Cyber Security For Critical Manufacturing (ManuSec)

Cyber Security For Critical Manufacturing (ManuSec)

Cyber Security For Critical Manufacturing (Manusec) is a global series of summits focusing on Cyber Security for Critical Manufacturing Sectors.

herdProtect

herdProtect

herdProtect is a second line of defense malware scanning platform powered by 68 anti-malware engines in the cloud.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

United Nations Office on Drugs & Crime (UNODC)

United Nations Office on Drugs & Crime (UNODC)

UNODC promotes long-term and sustainable capacity building in the fight against cybercrime through supporting national structures and action.

InfoExpress

InfoExpress

InfoExpress provides network security solutions that enhance productivity and security through better visibility, improved security, and automating device and mobile access to the network.

Meterian

Meterian

The Meterian Platform is a fuss-free solution to protect you against vulnerabilities in your app’s software supply chain.

Fasken

Fasken

Fasken is one of the largest business law firms in Canada and a recognized leader in privacy and cybersecurity law.

Allentis

Allentis

Allentis provide adapted solutions to ensure the security and performance of your information system.

MDSec

MDSec

MDSec is a consultancy with a passion for information security. Our consultants specialise in application, mobile and hardware security and targeted red team attacks.

Josef Ressel Centre for Intelligent & Secure Industrial Automation

Josef Ressel Centre for Intelligent & Secure Industrial Automation

The Josef Ressel Centre for Intelligent and Secure Industrial Automation investigates the fundamentals of digital assistants for industrial machines that enable intelligent and secure operation.

Capgemini

Capgemini

Capgemini is one of the world's foremost providers of consulting, technology and outsourcing services. Areas of expertise include Cybersecurity.

Sekur Private Data

Sekur Private Data

Sekur Private Data Ltd. is a Cybersecurity and Internet privacy provider of Swiss hosted solutions for secure communications and secure data management.

Dion Training Solutions

Dion Training Solutions

Dion Training Solutions offer comprehensive training in areas such as project management, cybersecurity, agile methodologies, and IT service management.