TECHNOLOGY > > Developments


« Back to News

2016-07-01

Frankenstein’s Paperclips

Rules governing the behaviour of AI systems have had currency since Isaac Asimov invented the “Three Laws of Robotics”. Now we need them.

2016-07-04

Technology Advances Too Fast For Government

The former head of the US Defense Advanced Research Projects Agency warns that technology is advancing too fast for governments to keep up.

2016-07-04

How Will IOT Change Banking?

The banking industry is now starting to see the various potential ways in which IoT can help to take it to the next level.

2016-06-30

Intelligent Robots And Automation Encroaching On All Industry Sectors

We’re seeing automation of labor across every industry, including manufacturing, wealth management and medicine.

2016-06-22

A Nano Generator To Power New Smart Cities

The cities of the future will be a lot “smarter” and to be so they will require a lot more electricity to keep everything running.

2016-06-22

Artificial Intelligence And Racism

Racism’s subtle influence can be unexpectedly powerful.

2016-06-19

The Use Of Intelligent Deception in Cyber Security

Hackers only need to be successful once, while organizations protecting sensitive information need to successfully thwart threats every day.

2016-06-16

Russian Hi-Tech Spy Devices

New Russian technologies, including phone call interception and a facial recognition app, have stirred a fierce debate about privacy & data monitoring.

2016-06-14

Now You See It: AI Will Become Invisible

In the near future, artificial intelligence will commonly become intangible, indistinguishable and incomprehensible for humans.

2016-06-13

Spying With Nano Robots Disguised As Insects

Spy technology emulates nature to develop successful controlled flight of a biologically inspired, insect-scale robot.

2016-06-03

Data Analytics Governance Gets More Important

Companies are wading in and testing the potential of data analytics, but it’s important that they understand the limitations of those analytics.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Code Decode Labs

Code Decode Labs

Code Decode Labs provides consulting for IT Technology, Cyber Security, Advanced Defense & Policing Technologies, Intelligent Networks, and Information Security.

iboss Network Security

iboss Network Security

The iboss cloud is designed to deliver Network Security as a Service, in the cloud, using the best malware engines, threat feeds and log analytics engines.

ID-SIRTII/CC

ID-SIRTII/CC

Security Incident Response Team for Internet Infrastructure in Indonesia.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

CERT Tonga

CERT Tonga

CERT Tonga is the national Computer Emergency Response Team for Tonga.

ST Engineering

ST Engineering

ST Engineering is a leading provider of trusted and innovative cybersecurity solutions.

Red River

Red River

Red River is a technology transformation company, bringing 25 years of experience and mission-critical expertise in analytics, cloud, collaboration, mobility, networking and security solutions.

Diaplous Group

Diaplous Group

Diaplous Group is a leading Maritime Risk Management (MRM) provider, delivering specialized services to an ever-broadening portfolio of shipping, oil & gas, energy and construction industries.

Agile Underwriting

Agile Underwriting

Agile, an underwriting agency, insurtech and Coverholder at Lloyd's, provides niche insurance products across Aviation, Marine & Cargo, Cyber and Financial Lines.

CrowdSec

CrowdSec

CrowdSec is an open-source & participative IPS able to analyze visitor behavior by parsing logs & provide an adapted response to all kinds of attacks.

Atomic Data

Atomic Data

Atomic Data is an on-demand, always-on, pay-as-you-go expert extension of your enterprise IT team and infrastructure.

Allurity

Allurity

Allurity is a group of tech-enabled cybersecurity service providers, comprised of best-in-class experts with a common mission to enable a safe digital world.

MLSecOps Community

MLSecOps Community

The MLSecOps Community is a collaborative space for machine learning security experts and industry leaders to connect and shape the future of AI/ML security.

Hydden

Hydden

Hydden gives security teams the ability to create a solid foundation to build a truly next-gen identity security practice by bridging the gaps between siloed teams and technologies.