TECHNOLOGY > > Developments


« Back to News

2015-10-15

Blackphone: Privacy-obsessed Smartphone

Silent Circle has released a second version of its signature smartphone designed to defeat tracking and interception.

2015-10-15

The Blockchain Might Be The Next Disruptive Technology

Bitcoin has been around for years. Its underlying technology — the blockchain — might be the most interesting and disruptive part of it.

2015-10-13

Apple Is Buying Into Artificial Intelligence

Apple has acquired a UK software startup that could give its digital assistant Siri a boost and has a growing portfolio of AI acquisitions.

2015-10-13

Who Will Step Up To Secure The Internet Of Things?

As everything in our Internet-enabled world becomes increasingly connected, everything is becoming accessible and potentially vulnerable.

2015-10-12

GCHQ Can Hack My Smartphone Using a Bunch of Smurfs

Dreamy, Nosey, Tracker and Paranoid - the unlikely team of GCHQ avatars that can power remote surveillance & control of mobile phones.

2015-10-08

Snowden : Smartphones Can Be Remotely Controlled

Smartphone users can do "very little" to stop security services getting "total control" over their devices, says Edward Snowden.

2015-10-07

DARPA - Tech to Protect the Internet of Things

The Pentagon's emerging technology agency wants to know what a device's thermal output shows about potential cyber-intrusions.

2015-10-06

AI - Reshaping the Workplace

AI-powered business applications will automate jobs, rather than just a task and the the effects will ripple across organizations.

2015-09-23

Xerox Memory Labels Fight Counterfeiting

A printed "memory label" from Xerox that stores 36 bits of data that can be encrypted and used for authentication & tracking

2015-09-25

What Does Facebook Want With AI?

Study into artificial intelligence research is no longer the preserve of universities.

2015-09-15

A New Design for Cryptography’s Black Box

Advances in cryptography show how near-perfect computer security might be close at hand.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

iStorage

iStorage

iStorage is the leading global provider of PIN Activated, hardware encrypted, portable data storage solutions.

Magnet Forensics

Magnet Forensics

Magnet Forensics' family of digital forensics products are used globally by thousands of law enforcement, military, government and corporate customers.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

Future of Cyber Security Europe

Future of Cyber Security Europe

Future of Cyber Security Europe is a European wide event examining the latest cyber security strategies and technologies.

ICTSecurity Portal

ICTSecurity Portal

The ICTSecurity Portal is an interministerial initiative in cooperation with the Austrian economy and acts as a central internet portal for topics related to security in the digital world.

Center for Research on Scientific & Technical Information (CERIST)

Center for Research on Scientific & Technical Information (CERIST)

CERIST is a scientific and technical research centre with activities focused in the area of networks, information systems and IT security.

Horiba Mira

Horiba Mira

Horiba Mira is a global provider of automotive engineering, research and test services including services and solutions for automotive cybersecurity.

DisruptOps

DisruptOps

Built for today’s cloud-scale enterprises, DisruptOps’ Cloud Detection and Response platform automates assessment and remediation procedures of critical cloud security issues.

Octo

Octo

Octo, an IBM company, is a technology firm dedicated to solving the Federal Government’s most complex challenges, enabling agencies to jump the technology curve.

Immuta

Immuta

Immuta empowers data engineering and operations teams to automate data governance, security, access control & privacy protection.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

Axellio

Axellio

Axellio provides economic, end-to-end cyber security solutions designed for your team, environment, and security objectives, providing packet level visibility across your network.

Obrela Security Industries

Obrela Security Industries

Obrela provides security analytics and risk management services to identify, analyze, predict and prevent highly sophisticated security threats in real time.

VulnCheck

VulnCheck

VulnCheck helps organizations outpace adversaries with vulnerability intelligence that predicts avenues of attack with speed and accuracy.

Invictus International Consulting

Invictus International Consulting

Invictus International Consulting are a recognized leader in full-spectrum cyber technology solutions designed to protect the security of our nation's global defense and critical infrastructure.

Hunt & Hackett

Hunt & Hackett

Hunt & Hackett helps European companies prevent, detect and respond to today’s most advanced adversaries, safeguarding them against cyberthreats and espionage.