BUSINESS > Services > IT & Telecoms


« Back to News

2015-10-13

Who Will Step Up To Secure The Internet Of Things?

As everything in our Internet-enabled world becomes increasingly connected, everything is becoming accessible and potentially vulnerable.

2015-10-12

Social Media Firms 'Undermine' Police Investigating Terrorism

Britain's most senior counter-terror police officer says social media firms are putting lives at risk by refusing to co-operate with investigations.

2015-10-12

GCHQ Can Hack My Smartphone Using a Bunch of Smurfs

Dreamy, Nosey, Tracker and Paranoid - the unlikely team of GCHQ avatars that can power remote surveillance & control of mobile phones.

2015-10-09

Safe Harbour No More. Facebook Data Transfer Deal Is Ruled Invalid

EU Court of Justice rule the 'Safe Harbour' agreement that companies have relied on to move personal data across the Atlantic is invalid.

2015-10-08

Snowden : Smartphones Can Be Remotely Controlled

Smartphone users can do "very little" to stop security services getting "total control" over their devices, says Edward Snowden.

2015-10-07

Where’s The Money in Data?

How do we use data to drive revenue?

2015-10-07

Hackers Burrow Into Apple's Walled Garden

The walled garden has a rather nasty infestation. Several Chinese apps were discovered to contain code that could steal user information.

2015-10-05

Why Is China Hacking Norway?

Half of all cyber intrusions in the Nordic states target Norwegian companies and Norway seems to be the main target of Chinese hackers.

2015-09-29

The Differences Between Targeted Attacks and Advanced Persistent Threats

Very different and equally nasty, dealing with either of them calls for prudent strategy and dedication.

2015-09-28

Xi Jinping At Seattle Tech Summit

Microsoft co-founder Bill Gates is one of the many US tech leaders Chinese President Xi Jinping is meeting with during his visit to Seattle.

2015-09-23

Hackers Can Spy on Every Mobile

There is a security hole in modern telecommunication systems that allows cyber criminals to listen in & to read text messages.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

RSA Insurance Group

RSA Insurance Group

RSA is one of the world’s leading multinational quoted insurance groups. Commercial services include cyber risk insurance.

Experian

Experian

Experian provide software solutions to help organizations prevent identity fraud and crime.

Cysec - TU Darmstadt

Cysec - TU Darmstadt

CYSEC is the Cybersecurity faculty of the Technical University of Darmstadt and performs internationally renowned research in numerous areas of cybersecurity.

Fair Isaac Corporation (FICO)

Fair Isaac Corporation (FICO)

FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, optimize operations and meet strict government regulations.

Plug and Play Tech Center

Plug and Play Tech Center

Plug and Play is the ultimate innovation platform, bringing together the best startups and the world’s largest corporations.

Cyberstarts

Cyberstarts

Cyberstarts’ vision is to become the leading platform for amazing teams of entrepreneurs to solve the next big problems of the cybersecurity world.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

WebOrion

WebOrion

WebOrion is an All-in-One Web Security & Performance Suite. Fortify, accelerate and monitor your website today.

Industrial Defender

Industrial Defender

Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint.

Emtec

Emtec

Emtec’s cyber security team provides advisory, assessment, & managed security services that help you build the cyber security policies, toolsets & best practices to elevate your cyber security posture

HCS

HCS

HCS is an IT Company and Telecoms provider with an experienced team who are dedicated to ensuring our clients business systems are protected.

TriCIS

TriCIS

TriCIS design and engineer highly secure integrated solutions that meet the highest government and military security standards, providing information assurance to organisations across the globe.

QANplatform

QANplatform

QANplatform is a Quantum-resistant hybrid blockchain platform.

Defendis

Defendis

Defendis develops AI-powered cybersecurity solutions for Government Agencies, Banks, and Businesses, designed to helps them contain data leaks, minimise damage, and proactively hunt for new threats.

Dev Information Technology (DEV IT)

Dev Information Technology (DEV IT)

DEV IT is a leading IT solutions and services company. We deliver digital transformation and end-to-end IT services, from advisory to execution.