TECHNOLOGY > > Developments


« Back to News

2018-01-24

What Is Fog Computing?

An architecture that distributes resources of computing, storage, control and networking along the continuum from Cloud to Things.

2018-01-24

Stuxnet: The Father Of Cyberkinetic Weapons

Its the 10th anniversary of the Stuxnet attack on the Iranian nuclear weapons program. The world’s first cyber weapon opened Pandora’s box.

2018-01-17

Applying Blockchain to Cybersecurity

Blockchain technology's key attribute is that it enables secure information transmission on the network with no human involvement. That's useful.

2018-01-17

AI Powers VW’s New Electric Microbus

VW is working with NVidia to deliver AI features to the next generation of its vehicles, like speech & gesture recognition and driver monitoring.

2018-01-23

AI Can Simplify The Purchasing Process For Business

US government workers and contractors could use AI to navigate regulations to make the federal purchasing process cheaper and less complex.

2018-01-15

VW and Hyundai To Offer Autonomous Cars

Self-driving taxis will be the staring point for autonomous vehicles offered by the big car companies as they link with technology partners.

2018-01-10

Pentagon Seeks Laser-Powered Bat Drones

Flying robots that move like living animals, crafted of next-generation materials that draw their power from energy beamed from nearby aircraft.

2017-12-29

Intelligent & Autonomous Security Robots

A new artificial intelligence technology that gives security guard robots the ability to communicate & deploy jointly at the same patrol site.

2017-12-19

Google To Open An AI Centre In Beijing

Google's search engine is blocked in China, yet both have ambitions to become AI superpowers and that's enough to overcome their differences.

2017-12-18

Russia Will Build A Separate Internet Directory

The Russian government plans to build an “independent internet” for BRIC nations as an alternative to the global Domain Name System .

2017-12-06

More Businesses Could Use Machine Learning

Few fields promise to “disrupt” life as we know it quite like machine learning, but many applications of machine learning technology go unseen.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Code Decode Labs

Code Decode Labs

Code Decode Labs provides consulting for IT Technology, Cyber Security, Advanced Defense & Policing Technologies, Intelligent Networks, and Information Security.

RIVA Solutions

RIVA Solutions

RIVA provides innovative best practices in IT and management consulting, program support services and emerging technologies.

Cimcor

Cimcor

Cimcor’s flagship software product, CimTrak, helps organizations to monitor and protect a wide range of physical, network and virtual IT assets in real-time.

Sandia National Laboratories

Sandia National Laboratories

Sandia National Laboratories is a premier science and engineering lab for national security and technology innovation.

CryptoTec

CryptoTec

CryptoTec is a provider of security concepts and encryption solutions for secure communication between decentralized computerized systems.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

Ingenio Global

Ingenio Global

Ingenio is a specialist recruitment business for SaaS companies. Our purpose is to source exceptional talent in areas including cyber security for leading SaaS companies in the UK and Ireland.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

Aryaka

Aryaka

Aryaka’s SmartServices offer connectivity, application acceleration, security, cloud networking and insights leveraging global orchestration and provisioning.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

ZILLIONe

ZILLIONe

ZILLIONe is one of Sri Lanka´s top enterprise technology solutions providers.

Crispmind

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.

IT-Schulungen.com / New Elements GmbH

IT-Schulungen.com / New Elements GmbH

Under the name IT-Schulungen.com, the Nuremberg-based New Elements GmbH has been operating one of the largest training centres in the German-speaking world for over 20 years.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.

Toro Solutions

Toro Solutions

Toro provide managed security & consultancy to keep governments, businesses & society resilient in the space where cyber, physical & people security converge.