TECHNOLOGY > > Developments


« Back to News

2020-11-13

Game-Changing Cyber Security Technology

Using iOS, Android and Microsoft apps, Keyavi can protect data files with multi-layered intelligence, self-protection & self-aware security.

2020-11-06

Criminal Use Of Artificial Intelligence

From targeted phishing campaigns to adversarial networks, here are just some of the ways that AI can be used to launch criminal cyber attacks.

2020-11-03

Securing AI In Military Systems

Military robots will in the future incorporate AI that could make them capable of undertaking missions on their own. They must be immune to hackers.

2020-10-28

Cyber Professionals Fear Being Replaced By AI

Survey: Young cyber security professionals are happy in their jobs, but much more concerned about the impact of AI than their older colleagues.

2020-10-26

AI Is Evolving Into A Business Necessity

The transformative power of AI is affecting all aspecta of business, management, operations, people & culture. Including cyber security.

2020-10-20

Artificial Intelligence: Threats & Opportunities

AI is a potentially revolutionary technology with a transformative impact on economic activity, but with some negative effects for jobs and democracy.

2020-10-16

AI Can Help Fight Coronavirus Cyber Crime

Artificial Intelligence and Machine Learning can help to solve a wide range of cyber security problems caused by the Coronavirus crisis.

2020-09-29

Artificial Intelligence Is The Future Of Security

Using AI and ML to combat malware and phishing attacks can help security teams focus on understanding the growing volume of threats.

2020-09-30

What You Need to Know About 5G

5G Networks are the new generation of mobile internet connectivity on smartphones and other devices. What difference will 5G make to our lives?

2020-09-14

Superhuman Brain-Hacking Device

Elon Musk is due to demonstrate a working brain-to-machine interface as part of his ambitious plans to give people superhuman powers.

2020-09-10

Artificial Intelligence Improves Business Processes

As Artificial Intelligence technologies proliferate, they are becoming an imperative for all businesses that want to find a competitive advantage.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Morgan Lewis Law

Morgan Lewis Law

Morgan Lewis is an international law firm with offices in North America, Europe, Asia, and the Middle East. Practice areas include Privacy and Cybersecurity.

CERT Polska

CERT Polska

CERT Polska is the first Polish computer emergency response team and operates within the structures of NASK (Research and Academic Computer Network) research institute.

Gigasoft

Gigasoft

Gigasoft provide secure online data backup & cloud backup services for the education sector and businesses.

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

Teramind

Teramind

Teramind provides a user-centric security approach to monitor employee behavior in order to identify suspicious activity, detect possible threats, monitor efficiency, and ensure industry compliance.

Infortec

Infortec

Infortec provide consultancy and solutions for the protection of digital information and the management of computer resources.

Thomsen Trampedach

Thomsen Trampedach

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

ACA Group

ACA Group

ACA Group are a leading governance, risk, and compliance (GRC) advisor in financial services.

Entara

Entara

Entara (formerly YJT Solutions) is an eXtended Service Provider (XSP) focused on providing cutting edge technology and cyber security solutions to companies in regulated industries.

Chartered Institute of Information Security (CIISec)

Chartered Institute of Information Security (CIISec)

CIISec is dedicated to helping individuals and organisations develop capability and competency in cyber security.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

VC3

VC3

VC3 provides a full range of Information Technology Solutions and Services to hundreds of municipalities and organizations throughout the USA.

Fibernet

Fibernet

Fibernet's innovative solutions in the fields of cybersecurity and fiber optics range from telecommunications infrastructure to small business cybersecurity.

Creative Network Innovations (CNI)

Creative Network Innovations (CNI)

Creative Network Innovations is a leader in providing advanced IT and cybersecurity solutions.

Maltiverse

Maltiverse

Maltiverse is a threat intelligence platform that provides security teams with high-fidelity threat data and malicious IOCs to enhance detection and response.