TECHNOLOGY > > Developments


« Back to News

2021-08-26

Big Data & Cloud Computing - Concurrent Technologies Of The Digital Revolution

The storage & processing of massive quantities of internet data sparked the simultaneous usage of big data and cloud computing. By Ryan Jason

2021-08-04

New Tools Optimise Use Of Existing Data

Advances in cloud-based analytic tools are providing cost-effective operational improvements to ageing IT systems across many sectors.

2021-05-14

Automation & Industry 4.0

Industry 4.0 is a concept of creative convergence, similar to the evolutionary transition from single celled organisms to functioning organic networks.

2021-05-04

Risks Of Bias In ‘Emotional AI’

Facial recognition mass surveillance software used to scan crowds to detect doubt and anger as emotions that indicate potential threats, is not safe.

2021-04-30

Why Kubernetes Is The Future Of Cloud Computing

Kubernetes is an open-source container-orchestration system for automating computer applications. So what? By Stella Lincoln

2021-04-28

Better Cyber Security For Smart Devices

Secure by Design: The British government is working to ensure consumer "smart" devices are more secure, with security built in from the start.

2021-04-27

Industry 5.0 Will Transform The Workplace

Connectivity: Just when you were starting to get a handle on Industry 4.0, the next technolgical step change has already begun to take shape.

2021-04-15

Making 2FA More Secure

2FA provides a way of 'double checking' that you really are the person you are claiming to be and new technology applies this to facial movements.

2021-04-09

The Future Of Blockchain In Cyber Security

Blockchain technologies are the culmination of decades of research into cryptography and have an inherent connection to cyber security.

2021-04-06

The Satanic Mills of the Fourth Industrial Revolution

America has a huge role to play in the Fourth Industrial Revolution, if it is smart enough and disciplined enough to embrace it. By Ronald Marks

2021-03-25

China Plans For Supremacy In AI & Quantum Computing

China's latest five-year plan stands out for its emphasis on advanced technologies and innovation as it aims for supremacy in key sectors.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BMC Software

BMC Software

BMC provide solutions for IT service management, Cloud management, IT workload automation, IT operations, and mainframe system management.

Teradata

Teradata

Teradata is a leading provider of enterprise big data analytics and services. Applications include Cyber Security Analytics.

Allianz

Allianz

Allianz Cyber Protect is a comprehensive cyber insurance provided internationally and tailored to your company´s risk profile.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

Nixu

Nixu

Nixu is the largest Nordic specialist company in information security consulting.

Northwave

Northwave

Northwave offers an Intelligent combination of cyber security services to protect your information.

SecurePay

SecurePay

SecurePay is Australia's premier payment gateway, with a range of secure online payment solutions for online retailers, SMEs and enterprise businesses.

HackCon Norway

HackCon Norway

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas.

FTAPI Software

FTAPI Software

FTAPI SecuTransfer is a software solution for end-to-end encrypted data exchange of large and sensitive data with customers and partners.

A-LIGN

A-LIGN

A-LIGN is a technology-enabled security and compliance partner trusted by more than 2,500 global organizations to mitigate cybersecurity risks.

BEAM Teknoloji

BEAM Teknoloji

BEAM Technology is an independent Software Quality and Security Testing Center in Turkey.

Identity Defined Security Alliance (IDSA)

Identity Defined Security Alliance (IDSA)

IDSA is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies.

eLearnSecurity

eLearnSecurity

eLearnSecurity is an innovator in the IT Security training market providing quality online courses paired with highly practical virtual labs.

OISTE Foundation

OISTE Foundation

OISTE foundation allows users to control their digital identities using well-understood and secure algorithms that ensure the continued validity of an identity and its claims.

CHEQ

CHEQ

CHEQ provides fully autonomous, preemptive technology for brand safety and ad-fraud prevention.

AVANTEC

AVANTEC

AVANTEC is the leading Swiss provider of IT security solutions in the areas of cloud, content, network and endpoint security.

Trellix

Trellix

Trellix is an extended detection and response (XDR) solutions provider created from a merger of McAfee Enterprise and FireEye Products.