Bistech Group plc

Belkins
Bistech is the UK’s top independent business communications provider, delivering technology solutions to maximise operational efficiency and deliver great ROI. Established in 1988, our industry knowledge spans four decades. Our approach is unique. We constantly innovate to deliver elegant solutions that others simply cannot. We remain independent to ensure we have the flexibility to offer the best technologies across the market. And we invest in long term partnerships, with customers at the heart of everything we do.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

NEW MILUM TROJAN USED AGAINST MID-EASTERN TARGETS

scmagazine | March 26, 2020

news image

Kaspersky has uncovered an highly targeted attack striking a single country using a trojan written in C++ that has not been spotted before. Dubbed Milum, the trojan shows no code similarities with known campaigns reported Kaspersky’s Threat Attribution Engine and only three instances of it have bee found and are considered all part of the same operation which received the code name operation WildPressure. When successfully installed the trojan can enable a remote attacker to gain control o...

Read More

DATA SECURITY

HUAWEI AND RCR WIRELESS HOST A FIRESIDE CHAT ON ZERO-TRUST CYBERSECURITY STRATEGY

Huawei | May 13, 2021

news image

In collaboration with RCR Wireless, Huawei Technologies USA held a fireside chat with Andy Purdy, Chief Security Officer at Huawei Technologies USA, and Sean Kinney, Editor in Chief at RCR Wireless, to explore how organizations can understand and adopt zero-trust strategies. Purdy, a cybersecurity specialist, provides insights into accelerating the global adoption of standardized processes for ensuring the security of all telecom devices. He also discusses the wider implications of Huawei's ...

Read More

TESLA AUTOPILOT DUPED BY ‘PHANTOM’ IMAGES

Threatpost | February 03, 2020

news image

Researchers said that they were able to create “phantom” images purporting to be an obstacle, lane or road sign and trick systems into believing that they are legitimate. On the scale of level 0 (no automation) to level 5 (full automation), thes...

Read More

COVID-19 PANDEMIC MOVES ORGANIZATIONS TO INCREASE CYBERSECURITY SPENDING

Cisco | May 22, 2020

news image

Coronavirus crisis creating new opportunities for cybercriminals, 70 percent of organizations are seeing the value of increasing their investments in cybersecurity solutions. The challenge for many organizations is continuing to accomplish their sec...

Read More

scmagazine | March 26, 2020

news image

NEW MILUM TROJAN USED AGAINST MID-EASTERN TARGETS

Kaspersky has uncovered an highly targeted attack striking a single country using a trojan written in C++ that has not been spotted before. Dubbed Milum, the trojan shows no code similarities with known campaigns reported Kaspersky’s Threat Attribution Engine and only three instances of it have bee found and are considered all part of the same operation which received the code name operation WildPressure. When successfully installed the trojan can enable a remote attacker to gain control o...

Read More

DATA SECURITY

Huawei | May 13, 2021

news image

HUAWEI AND RCR WIRELESS HOST A FIRESIDE CHAT ON ZERO-TRUST CYBERSECURITY STRATEGY

In collaboration with RCR Wireless, Huawei Technologies USA held a fireside chat with Andy Purdy, Chief Security Officer at Huawei Technologies USA, and Sean Kinney, Editor in Chief at RCR Wireless, to explore how organizations can understand and adopt zero-trust strategies. Purdy, a cybersecurity specialist, provides insights into accelerating the global adoption of standardized processes for ensuring the security of all telecom devices. He also discusses the wider implications of Huawei's ...

Read More

Threatpost | February 03, 2020

news image

TESLA AUTOPILOT DUPED BY ‘PHANTOM’ IMAGES

Researchers said that they were able to create “phantom” images purporting to be an obstacle, lane or road sign and trick systems into believing that they are legitimate. On the scale of level 0 (no automation) to level 5 (full automation), thes...

Read More

Cisco | May 22, 2020

news image

COVID-19 PANDEMIC MOVES ORGANIZATIONS TO INCREASE CYBERSECURITY SPENDING

Coronavirus crisis creating new opportunities for cybercriminals, 70 percent of organizations are seeing the value of increasing their investments in cybersecurity solutions. The challenge for many organizations is continuing to accomplish their sec...

Read More