TECHNOLOGY > > Developments


« Back to News

2018-07-23

China Dominates Global Investment In AI

Chinese investment and financing in AI technology accounts for 60 percent of the worldwide total, valued in 2017 at $27 billion.

2018-07-20

Big Data Becomes Everyone's Job

Once a responsibility reserved for IT and technical experts, Big Data is entering an era where everyone needs to use data in their own roles.

2018-07-18

The White House’s AI Committee's First Meeting

The high level group is charged with establishing partnerships between government, the private sector and independent researchers.

2018-07-17

Don't Leave AI Governance To The Machines

Now AI has the ability to reach its own conclusions, governance over the machines is critical for both business executives & customers.

2018-07-13

Breakthrough Technologies To Combat Insider Threats

Advances in technology have a positive outlook on keeping sensitive data safe. Here are five emerging tools for mitigating insider threats.

2018-07-11

HSBC Robots Aren't Bankers. Yet

The head of innovation for HSBC thinks a robot powered by machine learning could help the multinational bank transform retail banking.

2018-07-10

Police Criticised For Face Recognition Failures

Face recognition is contentious because of issues of privacy and race. Some experts are saying face recognition software is not ready for Police use.

2018-07-09

Blockchain For US Border Security

DHS want to combine blockchain technology with US border sensors and cameras to protect the integrity of data collected by IoT devices.

2018-07-05

Using AI To Reduce Business Risks

The constant evolution of malware, ransomware and other threats makes detection with conventional cybersecurity protocols increasingly difficult.

2018-07-04

What Does Blockchain Mean To The EU?

There are growing indications that the European Union is waking up to the vast potential offered by the technology.

2018-07-02

Google AI To Predict Patient Healthcare Outcomes

Google has a tool that could forecast patient outcomes, how long they may stay in hospitals, odds of re-admission and chances they will die.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Acuity Risk Management

Acuity Risk Management

Acuity Risk Management helps businesses worldwide effectively manage, prioritize and report on their risks to inform strategic and tactical decision-making and build long-term resilience.

RPC

RPC

RPC is a business law firm. Practice areas include technology and cyber risk.

FIRST Conference

FIRST Conference

Annual conference organised by the Forum of Incident Response and Security Teams (FIRST), a recognized global leader in computer incident response.

Disklabs

Disklabs

Disklabs are industry leaders in data recovery, digital forensics and data erasure.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

SecureMetric Technology

SecureMetric Technology

SecureMetric is one of SE Asia’s leading players in the field of digital security with a focus on Software Licensing Protection, 2-Factor Authentication, Advanced Identity and Access Management, Publi

SentryBay

SentryBay

SentryBay is a real-time data security company developing technology for PC, mobile, the cloud and IoT.

Center for Education & Research in Information Assurance & Security (CERIAS)

Center for Education & Research in Information Assurance & Security (CERIAS)

CERIAS is one of the world’s leading centers for research and education in areas of information and cyber security.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

Alibaba Cloud

Alibaba Cloud

Alibaba Cloud is committed to safeguarding the cloud security for every business by leveraging a comprehensive suite of enterprise security services and products on the platform.

Artifice Security

Artifice Security

Artifice Security will demonstrate real-world attacks on your network, web applications, infrastructure, and personnel to expose your hidden security risks.

SLVA Cybersecurity

SLVA Cybersecurity

SLVA Cybersecurity excel at delivering security-as-a-service, fit-for-purpose, within the constraints of realistic budgets and business expectations.

ALSCO

ALSCO

ALSCO is dedicated to bringing first class IT services, technical support, and solutions to goverment, companies and organizations worldwide.

Skyhigh Security

Skyhigh Security

Skyhigh Security enables your remote workforce while addressing your cloud, web, data, and network security needs.

Amtivo Group

Amtivo Group

Amtivo provides Certification, Inspection and Training services to national and local Government bodies, multi-nationals, enterprise clients and SMEs.

Vonahi Security

Vonahi Security

Vonahi Security is a cybersecurity SaaS company that pioneered automated network penetration testing.