TECHNOLOGY > > Developments


« Back to News

2022-03-09

NATO Tests A Post-Quantum VPN

Post-Quantum technology provides different powerful algorithms to ensure security, even when facing attackers using quantum computing.

2022-02-25

Drawbridge Wins ‘Best Cyber Security Solution’

Drawbridge has been selected as ‘Best Cyber-Security Solution’ at the Intelligence HFM US Quant Services Awards 2022.

2022-02-15

Making Security Seamless - The Common Identity Platform

By establishing a Common Identity Platform, it is perfectly possible to achieve a seamless identity management service. By Jacob Ideskog

2022-02-09

High-Tech Lie Detection Systems

Brain-scanning technologies & cheaper computing power offer powerful new lie-detection tools based on measuring cognitive changes.

2022-02-02

Winner: NSA Best Cyber Security Research Paper

The US spy agency runs an annual competition to find the best cyber security scientific research. This year's winner is all about cryptography.

2022-01-31

Artificial Intelligence Is Increasingly Important In Cyber Security 

Force Multiplier: AI offers major advantages for protecting people, systems & organisations from the relentlessly growing range of cyber threats.

2022-01-11

Super Intelligent Machines Need An Off Switch

They’re Already Here: An AI system with superior intelligence to humans could learn independently & have access to all the data of humanity.

2022-01-10

What To Expect From Data Science In 2022

What's Going On: Data science is being applied to multiple industries for different purposes across a broad range of business operations.

2021-12-14

Keeping Women Safe On British Streets

WalkSafe: Women feel less safe when walking alone after dark and now there is a real time SatNav tracking App available to give reassurance.

2021-12-07

A Short Guide To Building Cloud-Based SaaS Applications

Cloud based SaaS apps have many advantages: they are cost-effective, reliable, update automatically & have a high level of security. By Kate Harrison.

2021-10-22

Top Nine Technology Trends Of 2021

The technology industry is evolving fast and keeps improving every passing day. Here are some of the latest technology trends to be aware of.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CDNetworks

CDNetworks

CDNetworks is a global content delivery network with a fully integrated cloud security solution, offering unparalleled speed, security and reliability for the almost instant delivery of web content.

SGCyberSecurity

SGCyberSecurity

SGCyberSecurity is Singapore's No.1 Cyber Security portal. From this platform, you will be able to find useful articles, resources and connect with the security companies for your business needs.

Calian Group

Calian Group

Calian is a diverse Canadian company offering professional services in areas including Advanced Technologies, Health, Learning and IT & Cyber Solutions.

Bluink

Bluink

Bluink specializes in identity and access management and customer identity verification, using your smartphone as a strong authenticator and secure identity store.

Destel

Destel

Destel is a system integrator and provider of IT services focused on Advanced Network & Security Solutions.

6point6

6point6

6point6 is a technology consultancy with strong expertise in digital transformation, emerging technology and cyber security.

Hyperproof

Hyperproof

Hyperproof is a cloud-based compliance operations software. Launch new programs immediately, collect evidence automatically, and manage a compliance program intelligently.

Advantio

Advantio

Advantio offers a unique combination of technologies and managed, advisory and testing services to increase your cyber resilience and compliance.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

Seigur

Seigur

Seigur is an IT consultancy business providing flexible legal and cyber security services for IT and data privacy programmes.

Tenet3

Tenet3

Tenet3's vision is to make optimal cyber strategy development tractable, data driven, with concrete success metrics. The result is cost effective cyber resilience for our customers.

Atlas VPN

Atlas VPN

Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

ARGOS Cloud Security

ARGOS Cloud Security

ARGOS aims to simplify and strengthen cloud security, by creating a visual map of security vulnerabilities, to your priceless information stored in any cloud provider environment.

Vernetzen

Vernetzen

Vernetzen is an industrial network and cybersecurity innovator focused on delivering practical solutions to connect and secure industry across the globe.

TraitWare

TraitWare

The TraitWare mission is to increase user and company security while simplifying access to digital and physical resources through the elimination of the need for usernames and passwords.