TECHNOLOGY > > Developments


« Back to News

2019-01-22

Blockchain Applications For Identity Verification

Blockchain's fundamental capacity to reconcile and keep a record of transactions has potential to carve out a niche in identity management.

2019-01-22

AI Will Find You In The Crowd

Neural network researchers say artificial intelligence can detect and identify individuals without facial recognition.

2019-01-22

World Economic Forum Cyber Risks Report

WEF 2019 examines “what-if” Future Shocks in quantum computing, weather manipulation, monetary populism and emotionally responsive AI.

2019-01-21

The Impact Of Tech Disruption On Jobs

If the robots can replace us, what are we left to do? Deloitte has looked at how the nature of work is shifting with automation.

2019-01-16

Quantum Computing Will Overtake Conventional Computing

Conventional computers are reaching their limit. Quantum computers, which calculate using quantum phenomena are the replacement.

2019-01-17

Blockchain Transforms The Internet of Things

Volkswagen and Bosch are changing the way they work by connecting the IoT to the decentralised data market using Blockchain technology.

2019-01-24

DARPA Wants To Emulate Insect Brains

Insects are small, efficient and capable of basic reasoning. US military researchers at DARPA want artificial intelligence tools that do the same.

2019-01-09

Quantum Computing – Advantage Or Security Threat?

Some US government agencies see quantum computing and artificial intelligence as potential near-term security threats.

2018-12-27

5G Mobile Technology Poses An Espionage Risk

Next generation 5G mobile internet promises much greater connectivity, but Canada's spy chief thinks it will facilitate state-sponsored espionage.

2018-12-27

The Fourth Industrial Revolution Built On Blockchain And AI

The need for Big Data analytics and the combination of AI and blockchain are key components of the Fourth Industrial Revolution.

2019-01-02

Are Bank-backed Cryptocurrencies The Real Future Of Blockchain?

Discussions concerning central banks and the issuance of digital payment vehicles have turned to blockchain technology.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

AvePoint

AvePoint

AvePoint is an established leader in enterprise-class data management, governance, and compliance software solutions.

NNIT

NNIT

NNIT​ is one of Denmark’s leading consultancies in IT development, implementation and operations, including cyber security.

SISSDEN

SISSDEN

SISSDEN will improve cybersecurity through the development of increased awareness and the effective sharing of actionable threat information.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Air Informatics

Air Informatics

Air Informatics LLC provides security, information management, analytics and informatics for IT and wirelessly enabled airplanes and operations.

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

The Center for Analysis & Investigation of Cyber-Attacks is one of the leading Kazakhstan organisations in the field of information and computer security.

Secure Digital Solutions (SDS)

Secure Digital Solutions (SDS)

Secure Digital Solutions is a leading consulting firm in the business of information security providing cyber security program strategy, enterprise risk and compliance, and data privacy.

Capital Network Solutions

Capital Network Solutions

Capital Network Solutions are a highly accredited managed IT services and consultancy provider, specialising in cyber security, infrastructure and communications.

Sectyne

Sectyne

Sectyne is a full-stack cyber consultancy committed to providing tailored services, advisory consultations, and training.

Lupovis

Lupovis

Lupovis is an AI-based deception solution that deploys active decoys turning your network from a flock of sheep to a pack of wolves where the hunter becomes the hunted.

Eviden

Eviden

Eviden is an Atos business that brings together its digital, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation.

Securin

Securin

Securin offers a comprehensive portfolio of solutions including Attack Surface Management, Vulnerability Intelligence, Penetration Testing, and Vulnerability Management.

Xeol

Xeol

Software free of vulnerabilities, built and distributed by trusted entities. Our mission is to help customers secure their software from code to deploy.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.

Evolve Business Group

Evolve Business Group

Evolve is an independently-owned managed network solutions provider, creating bespoke packages for customers globally since 2005.