TECHNOLOGY > > Developments


« Back to News

2019-12-11

A Massive Datacenter On Single Chip

A huge data center, which would use enormous amounts of energy to crunch data in a large building, can be placed on a single computer chip.

2019-12-10

Artificial Intelligence Is Already Reshaping Our Lives

AI is revolutionising how the everyday world works, including applications from streamlining operations to informing better decision making.

2019-12-10

Finland Has A Cyber Security Standard For IoT

As consumers become more reliant on smart devices and calls for IoT regulation spread internationally, Finland has set the standard.

2019-12-09

AI And IoT Have Created The AIoT

The IoT creates vast connections, AI makes these devices come alive, creating AIoT networks of devices that can communicate and process data.

2019-12-09

Darktrace Wins Lloyds Award

British cybersecurity company Darktrace has won the prestigious Lloyds Bank Business award for its pioneering work using artificial intelligence.

2019-12-04

Russia’s AI Mission Is State-Driven

Russia's recognition of the strategic significance of Artificial Intelligence is taking shape and it appears to be focusing on military applications.

2019-12-03

US & China Are Investing Big In Quantum Computing Simulation

Quantum simulators permit the study of quantum systems that are difficult to study in the laboratory and impossible to model with a supercomputer.

2019-11-29

Internet of Things: Cyber Security Threats In 2020

IoT devices can work seamlessly at home, industry and in business. The problem is they also allow hackers easy ways into computer systems.

2019-11-27

Tracking 5G Protocol Flaws

Researchers have identified various security flaws in the 5G communications protocol. These include user tracking, eavesdropping and spurious billing.

2019-11-27

Cloud Storage: What Is It & Who Runs It?

Cloud computing involves outsourcing tasks you can do using your own equipment to a few large corporations. To assume it is secure is a mistake.

2019-11-25

Regulatory Plans For Artificial Intelligence & Algorithms

Two pieces of legislation are under consideration by the US Congress, one regulating the use of Algorithms and the other the development of AI.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Protergo Cyber Security

Protergo Cyber Security

Protergo Cyber Security is the first integrated provider of cybersecurity solutions in Indonesia. We proactively protect our clients from cyber threats.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

European Cyber Security Conference

European Cyber Security Conference

EU Cyber Security Conference will debate what Europe’s response to evolving threats in a dynamic global risk landscape should look like and what the next steps for all actors of the ecosystem.

Crypto Valley Association

Crypto Valley Association

Crypto Valley Association is an independent, government-supported association established to build the world’s leading blockchain and cryptographic technologies ecosystem.

Seavus Accelerator

Seavus Accelerator

Seavus Accelerator's goal is to create an enabling and stimulating environment for start-ups growth and provide continuous high quality acceleration and investment support.

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet is a network of companies who collaborate to address skills needs within the technology sector.

CHEQ

CHEQ

CHEQ provides fully autonomous, preemptive technology for brand safety and ad-fraud prevention.

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP) is the Swedish industry association for Swedish incubators and science parks.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

Netpoleon Group

Netpoleon Group

Netpoleon is a leading provider of integrated security, networking solutions and value added services.

Think|Stack

Think|Stack

Think|Stack is a managed IT services company specializing in cloud and cybersecurity with human-centered design.

NXM Labs

NXM Labs

NXM is a leader in a leader in advanced cybersecurity software for connected devices.

Otava

Otava

Otava is a global leader of secure, compliant hybrid cloud and IT solutions for service providers, channel partners and enterprise clients.

B2Bcert

B2Bcert

B2BCERT one of the top companies offering ISO 9001, ISO 14001, ISO 45001, ISO 22000, ISO 27001, ISO 20000,CE Marking, HACCP, and other globally accepted standards and Management solutions.

Hudson Rock

Hudson Rock

Hudson Rock’s products — Cavalier & Bayonet — are powered by our cybercrime database, composed of millions of machines compromised by Infostealers in global malware spreading campaigns.