TECHNOLOGY > > Developments


« Back to News

2020-09-29

Artificial Intelligence Is The Future Of Security

Using AI and ML to combat malware and phishing attacks can help security teams focus on understanding the growing volume of threats.

2020-09-30

What You Need to Know About 5G

5G Networks are the new generation of mobile internet connectivity on smartphones and other devices. What difference will 5G make to our lives?

2020-09-14

Superhuman Brain-Hacking Device

Elon Musk is due to demonstrate a working brain-to-machine interface as part of his ambitious plans to give people superhuman powers.

2020-09-10

Artificial Intelligence Improves Business Processes

As Artificial Intelligence technologies proliferate, they are becoming an imperative for all businesses that want to find a competitive advantage.

2020-08-25

AI Helps Organisations Resist Cyber Crime

Attacks are growing in volume and complexity all the time and AI is helping under-resourced cyber security teams stay ahead of threats.

2020-08-19

Advanced AI For Cyber Operations

US defense research agencies want “autonomous software agents” capable of countering targeted network attacks & large-scale malware campaigns.

2020-08-10

Using Artificial Intelligence In Academic Research

The right AI powered tools and techniques can make a significant difference in how research is conducted and how fast results are obtained.

2020-08-06

The Risk Of AI Being Used For Offensive Purposes

Many corporate cyber security teams are reliant upon outdated attack scenarios which are no longer resistant to AI-powered attacks.

2020-07-29

Vital Necessity Of Cloud Computing Highlights Security Risks

Orca Security's research finds that public cloud environments are rife with neglected workloads, authentication issues and lateral movement risk.

2020-08-03

Use Machine Learning To Predict What Is Most Likely To Be Exploited.

Risk-based vulnerability management helps you prioritize your remediation efforts to focus on the assets that matter most. Download Free e-Book.

2020-07-14

Huawei 5G Ordered Out Of UK Networks

Mobile operators will have to remove all the Chinese technology company's 5G equipment from their UK networks by 2027.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BakerHostetler

BakerHostetler

BakerHostetler is one of the largest law firms in the USA We have five core practice groups including a specialty practice team in Privacy and Data Protection.

Radware

Radware

Radware is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers.

Cyber Security Academy - University of Southampton

Cyber Security Academy - University of Southampton

An industry/University partnership established to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

Sintef Digital

Sintef Digital

Sintef Digital carries out research in Information and Communication Technology for industry and the public sector.

Nexcom International

Nexcom International

Nexcom operates six global businesses - IoT Automation, Intelligent Digital Security, Internet of Things, Intelligent Platform & Services, Mobile Computing Solutions, Network & Communications.

Wizlynx PTE LTD

Wizlynx PTE LTD

Wizlynx PTE LTD is the Singapore branch of Wizlynx Group located in Singapore, offering Information and Cyber Security Services throughout the entire Asia Pacific (APAC) region.

CipherBlade

CipherBlade

CipherBlade specializes in blockchain forensics, data science and transaction tracking.

Nemko

Nemko

Nemko offers testing, inspection, and certification services worldwide, mainly concerning products and systems, but also for machinery, installations, and personnel.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

Polymer

Polymer

Polymer is a Data Governance & Privacy Platform for third party SaaS apps. A modern Data Loss Protection (DLP) approach to remove sensitive data exposure on collaboration tools in real-time.

SolidRun

SolidRun

SolidRun is a leading provider of computing and network technology designed to streamline the deployment of edge computing infrastructure and support embedded and IoT markets.

Mutare

Mutare

For three decades, Mutare has been empowering organizations to re-imagine a better way to connect through our transformative voice security, digital voice and text messaging solutions.

US Department of State - Bureau of Cyberspace & Digital Policy

US Department of State - Bureau of Cyberspace & Digital Policy

The Bureau of Cyberspace and Digital Policy leads and coordinates the Department’s work on cyberspace and digital diplomacy to encourage responsible state behavior in cyberspace.

Orbis Cyber Security

Orbis Cyber Security

Orbis is one of the leading cybersecurity company in USA. Our cybersecurity specialist defends your data, combat threat, and modernize your compliance.

Kontra

Kontra

Kontra application security training is an interactive and intuitive learning experience that engages developers.

Backslash Security

Backslash Security

With Backslash, AppSec teams gain visibility into critical risks in their apps based on reachability and exploitability.