TECHNOLOGY > > Developments


« Back to News

2019-10-28

British Government Funds Chip Maker To Build Cyber Resilience

The UK is partnering with Arm to develop new chip technologies that are more resistant to cyber threats, backed by £36 million in funding.

2019-10-24

Happy Days Ahead For 5G Hackers

Fifth-generation mobile networks are going live with greatly improved latency & bandwidth. They also offer hackers greatly more potential for attack.

2019-10-22

Cybersecurity And The EU's Regime For 5G Networks

The powerful new features of 5G networking will bring numerous security challenges. A lot will depend on regulatory compliance. By Joao Paro

2019-10-15

AI Security Tool Thinks Much Faster Than Humans

An innovative new cyber security tool has been launched by Darktrace, one that thinks like a human but works at the speed of a computer.

2019-10-21

Warning For Pilots To Counter Airborne Hacking

'Cyber Anomaly Detected': A new real time system gives pilots information about what’s happening internally on their aircraft inflight.

2019-10-21

Using Blockchain Against Counterfeit & Forgery

The US Department of Homeland Security (DHS) wants to use blockchain to improve the agency’s ability to deal with counterfeiting and forgery.

2019-10-15

Incompatible: Privacy & The Internet of Things

Video surveillance is now considered an IoT application and cameras often connect with domestic automation systems, threatening privacy.

2019-09-28

Huawei Will Sell Its 5G Know-How

Huawei wants to address the widespread concerns over the integrity of its 5G network technology by licensing it to EU and US competitors.

2019-09-25

5G Needs A New Generation Of Security

5G networks can deliver much more data much faster, dramatically raising the stakes for ensuring the security & reliability of mobile communications.

2019-09-27

AI Is Changing The Cyber Security Landscape

Artificial Intelligence can be used to detect and prevent attacks before they take place, but it can also be a double-edged sword.

2019-09-23

Will Robots Be Allowed To Kill?

The advent of autonomous weapons demands some form of agreed international legal restrictions on their use. By Alfred Rolington

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

SAS Institute

SAS Institute

SAS is a leader in business analytics software and services providing solutions for a wide range of critical business areas including risk management, compliance and fraud prevention.

Totaljobs

Totaljobs

Totaljobs is the UK’s largest hiring platform. We have over 280,000 live jobs adverts on our site, helping you to find any type of job in any industry, including cybersecurity.

bluedog Security Monitoring

bluedog Security Monitoring

Sentinel from bluedog provides powerful and affordable internal network monitoring.

Billington CyberSecurity

Billington CyberSecurity

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity.

Predatech

Predatech

A cyber security consultancy offering a range of services, including CREST accredited penetration testing, vulnerability assessments and certifications incl. Cyber Essentials & Cyber Essentials Plus.

InfoSystems Inc

InfoSystems Inc

InfoSystems provides reliable IT solutions to build and maintain strong and secure systems for both SMB and enterprise organizations.

Scrut Automation

Scrut Automation

Scrut Automation's mission is to make compliance less painful and time consuming, so that businesses can focus on running their business.

Archon Secure

Archon Secure

Archon GoSilent Cube delivers a CSfC-certified, plug-and-play security solution for classified and unclassified communication when using the public Internet.

Northdoor

Northdoor

Northdoor provides a comprehensive set of services around information security and works with leading global technology vendors to deploy and manage cyber security solutions.

Sitehop

Sitehop

Sitehop is a cybersecurity technology company developing and supplying FPGA hardware-enforced cyber security solutions for networks.

CI-ISAC Australia

CI-ISAC Australia

CI-ISAC has been designed to support and promote existing legislation and Government initiatives that are working to uplift cyber resilience across critical infrastructure sectors.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.

AUCyber

AUCyber

AUCyber is a leading provider of managed cyber security solutions and consultancy services, specialising in supporting Australian organisations and Government agencies.

Assurestor

Assurestor

Assurestor's singular focus is delivering leading cloud-based backup and disaster recovery designed to increase levels of IT resilience.