TECHNOLOGY > > Developments


« Back to News

2018-07-02

Get Started with Predictive Analytics

Many businesses don't fully understand the holistic view predictive analytics can bring to their organisation. They need to try harder.

2018-06-28

IBM’s AI Can Argue With Humans

Bringing practical applications to AI technology has proven difficult and IBM's Project Debater shows there is a long way to go.

2018-06-25

Blockchain v World Cup – It Could Go To Penalties…

TV Adverts promoting Blockchain start-up Hdac are premature and possibly misleading about the current actual capability of the technology.

2018-06-25

Using Machine Learning To Spot Photoshopped Images

Adobe is using machine learning to make it easier to spot Photoshopped images. New research uses AI to automate traditional digital forensics.

2018-06-22

AI Is Re-Inventing IT

Artificial Intelligence is taking over the IT world, as companies use AI and machine learning to improve tech support & manage infrastructure.

2018-06-22

The Pentagon's AI Program To Find Hidden Nuclear Missiles

The US military is increasing spending on a secret research effort to use Artificial Intelligence to help anticipate the launch of a nuclear-capable missile.

2018-06-20

With Robots In Control, Chemical Makers Fight For Formula Ownership

Industrial robots are absorbing huge quantities of sensitive data from both manufacturers and customers, modifying key formulations as they go.

2018-06-20

How To Use AI & Predictive Analytics

Anticipate and prevent storage infrastructure problems by combining flash storage with cutting-edge predictive technology.

2018-06-19

Business AI Platform For Commercial Development

Some say that tackling business uncertainty can be greatly assisted by artificial intelligence, but it is a many-layered and complex process.

2018-06-15

EC-Council Sets New Application Security Training Standards

The information security certification body, EC-Council, is set to redefine application security by introducing an all new certification program.

2018-06-12

Russia Is Building A Separate Military Cloud

Russia is building a giant military cloud, to improve its ability to keep operating if its connection to the global Internet is hacked or severed.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ASIS International

ASIS International

ASIS International is a global community of security practitioners with a role in the protection of assets - people, property, and/or information.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

MNCERT/CC

MNCERT/CC

MNCERT/CC is the national Computer Emergency Response Team for Mongolia.

inBay Technologies

inBay Technologies

inBay Technologies' idQ Trust as a Service (TaaS) is a unique and innovative SaaS that eliminates the need for user names and passwords.

Information Technology & Cyber ​​Security Service (STISC) - Moldova

Information Technology & Cyber ​​Security Service (STISC) - Moldova

STISC is a public institution whose purpose is to ensure the administration, maintenance and development of the information technology infrastructure in Moldova.

Sanderson Recruitment

Sanderson Recruitment

Sanderson is a recruitment company providing expert recruitment services in areas including Cyber & Information Security.

Adzuna

Adzuna

Adzuna is a search engine for job ads used by over 10 million visitors per month that aims to list every job everywhere, including thousands of vacancies in Cybersecurity.

Variti

Variti

Variti Intelligent Active Bot Protection technology — traffic analysis, detection and stopping of malicious bots in real-time and effective response to DDoS attacks.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

Defscope

Defscope

Defscope is an Azerbaijani company entirely focused on cybersecurity offering training, security consulting, and other professional services.

European Cyber Competence Network

European Cyber Competence Network

The purpose of the European Cyber Competence Network is to retain and develop the cybersecurity technological and industrial capacities of the EU necessary to secure its Digital Single Market.

NANDoff Data Recovery

NANDoff Data Recovery

NANDoff is a flat rate data recovery service. We serve the electronics industry around the globe 24/7.

GrayMatter

GrayMatter

GrayMatter provides Advanced Industrial Analytics, OT Cybersecurity, Digital Transformation and Automation & Control services to clients across the U.S. and Canada.

Arelion

Arelion

Arelion is a leading light in global connectivity and we've been keeping the world connected for nearly three decades.

NuKuDo

NuKuDo

NukuDo redefine the boundaries of cybersecurity talent development. We are dedicated to cultivating top-tier professionals equipped to tackle the complex challenges of cybersecurity.

Odaseva

Odaseva

Odaseva delivers the strongest data security solution for enterprises running on Salesforce, safeguarding confidentiality and integrity of critical business information.