BUSINESS > Services > IT & Telecoms


« Back to News

2016-02-24

Know Your Enemy: The Most Popular Hacking Methods

The Easy Way: Outsiders want to become insiders with the least possible effort, and insiders help them do so - mostly accidentally.

2016-02-23

Israeli Cybertech Startups Set Trends

Cybertech 2016 in Tel Aviv showcased Israel's cybertech startups trying to make it big in the country's saturated tech startup ecosystem.

2016-02-23

Data Security – The Trends We Do Not See Coming

With the emergence of the Internet of Things (IoT) and the Cloud the security industry is going through a time of challenge and re-invention.

2016-02-22

Women Write Better Computer Code Than Men

Computer code written by women has a higher approval rating than that written by men - but only if their gender is not identifiable.

2016-02-17

MIT Develops A Hack-Proof RFID Chip

Do you know about RFID chips and how many you are carrying at this moment? What actually is an RFID chip?

2016-02-05

Who Needs A Computer Science Degree Anyway?

While they can’t necessarily replace a college degree, MOOCs are playing a key role in addressing the software development skills gap.

2016-02-10

TalkTalk's Cybersecurity Lesson

TalkTalk has been hacked three times in the past year. Companies must invest wisely to properly protect their customers & their reputations.

2016-02-10

Protecting The Crown Jewels Of Corporate Data

Knowing that an organization will suffer a breach sooner or later, IT security professionals must first protect the company's most important data.

2016-02-09

Intelligence Agencies Want To Target Surveillance Programs

IoT devices and cloud-based services represent the next frontier for digital surveillance, claims a new report from Harvard's Berkman Center.

2016-02-09

Knowing Cognitive Computing

Cognitive computing is the tech industry’s latest ‘it’ thing. Not just within the Big Data world, but also outside that realm.

2016-02-03

Facebook’s Next New Data Center Is Coming To Ireland

Renewable Energy & Low Taxes: Facebook announces it plans to open its second European data center in Ireland.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The Networking People (TNP)

The Networking People (TNP)

TNP supplies independent advice allowing large organisations to design, build and operate their own networks independently of the established telecoms companies.

Global Knowledge Training

Global Knowledge Training

Global Knowledge is a worldwide leader in IT and business training, featuring Cisco, Microsoft, VMware, IBM, security, cloud computing, and project management.

City Security Magazine

City Security Magazine

City Security magazine helps promote best security practices and keep businesses informed on a wide variety of security-related issues.

Aviva

Aviva

Aviva provides Cyber Liability cover for small to mid-market customers to help combat the threat of data and privacy breach.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

Digital Security

Digital Security

Digital Security is an Ecuadorian company specialized in providing comprehensive information security solutions.

TruNarrative

TruNarrative

TruNarrative provides a unified solution for Identity Verification, Fraud Detection, eKYC, Risk Assessment, AML Compliance and Account Monitoring.

Standards Council of Canada (SCC)

Standards Council of Canada (SCC)

SCC leads and facilitates the development and use of national and international standards and accreditation services in Canada.

GroupSense

GroupSense

GroupSense helps governments and enterprises take control of digital risk with cyber reconnaissance, counterintelligence and monitoring for breached credentials.

Action1

Action1

Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network.

Comcast Business

Comcast Business

Comcast Business keeps businesses ready for what’s next with powerful connectivity, advanced cybersecurity solutions, and the right people at your side.

Communicate Technology

Communicate Technology

Communicate Technology are IT, telecoms and cyber-security specialists, keeping over 500 businesses and 50,000 users connected and secure across the UK.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

Scalarr

Scalarr

Scalarr is an innovative, next-generation cyber security firm focused on automation and AI to detect and prevent threats in mobile and Edge/IoT infrastructures.