BUSINESS > Services > IT & Telecoms


« Back to News

2015-06-15

Instilling a Culture of Cyber Security

Companies selling cyber security say their tools will “defend” & “protect”. The reality is technology creates a false sense of security.

2015-06-09

NSA Planned to Plant Malware via Google & Samsung Phones

An NSA app-hijacking program, dubbed IRRITANT HORN, deployed to bug users mobile phones.

2015-06-09

UK Secret Report Urges US Data Sharing

Top secret report to the UK Prime Minister recommends a new international treaty to enforce cooperation of the US Internet giants.

2015-06-09

Stegosploit Hidden Image Code is the Future of Online Attacks

Attackers can embed executable JavaScript code within an image to trigger a 'drive-by download'.

2015-06-08

Bigger than Heartbleed - 'Venom' Threatens Datacenters

Before Heartbleed: Worst vulnerabilities ever?

2015-06-06

Flaw in YouTube Allows Removal of Any Video

Russian security researcher Kamil Hismatullin has discovered a critical flaw in YouTube.

2015-06-05

Unplugged: What the End of Metadata Collection Means for Intelligence

How useful is Metadata to the intelligence community and what will they do if it goes away?

2015-06-04

Sophos to Raise £100m From Stock Market Float

SOPHOS IPO could be one of the London stock market's largest technology floats.

2015-06-03

Hackers Build New Tor Client Designed to Beat the NSA

A new Tor client called Astoria designed specifically to make eavesdropping harder for the world's richest, most aggressive & most capable spies.

2015-06-01

Malware Remodeled

Malware is getting through enterprise defenses as attackers code new strains and re-clothe old ones.

2015-06-01

Will Open Source Save the Internet of Things?

Cloud apps that collect and analyze data are heavily dependent on open source software & standards.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CERT.BY

CERT.BY

The National Computer Emergency Response Team of the Republic of Belarus.

Zymr

Zymr

Zymr specialize in cloud computing solutions including Cloud Security, Cloud Mobility, Cloud Apps, Cloud Infrastructure and Cloud Orchestration.

Deep Identity

Deep Identity

Deep Identity is a boutique system integrator, with expertise in tailored identity governance & administration (IGA) and identity access management (IAM) solutions.

GuidePoint Security

GuidePoint Security

GuidePoint Security provide information security solutions that enable commercial and federal organizations to more successfully achieve their security and business goals.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

National Initiative for Cybersecurity Education (NICE)

National Initiative for Cybersecurity Education (NICE)

NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.

Conatix

Conatix

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity.

Lattice Semiconductor

Lattice Semiconductor

Lattice Semiconductor solves customer problems across the network, from the Edge to the Cloud, in the growing communications, computing, industrial, automotive and consumer markets.

RedLegg

RedLegg

RedLegg is a master provider of information security services, a boutique, nimble, old-fashioned customer service company that enjoys the technology battlefield.

Acumera

Acumera

Acumera is a leader in managed network security, visibility and automation services.

Execweb

Execweb

Execweb are a cybersecurity executive network, comprised of 400+ security practitioners who work at Fortune 500 and SME companies.

Arctic Group

Arctic Group

Arctic Group is a Swedish service provider focusing on cybersecurity, integration services and deployment of software development tools.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.

Yarix

Yarix

Yarix is the leading company in Var Group’s Digital Security division and one of the most recognised, innovative and authoritative Italian companies in the IT security sector.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.