TECHNOLOGY > > Developments


« Back to News

2015-09-07

NSA Gives $300,000 for a Safer Internet of Things

The NSA is funding development for architecture for a "safer" Internet of Things (IoT) to 'design in' better security.

2015-08-31

Biometric Security: From A Selfie To the Way You Walk

The mobile, cloud, banking & payments industries must prepare for the shift from traditional authentication to new biometric systems.

2015-08-27

A Drone That Hacks Computers

Aerial Assault: A quadcopter flying hacker that scans the world below for insecure devices and vulnerable WiFi ports.

2015-08-27

Hackers to Military: Replace Us with Robots –Don’t Think So!

Next year’s DARPA Cyber Grand Challenge event will pit humans against machines in a grand hacking war.

2015-08-24

Defusing The Internet Of Things Time Bomb

The IoT offerings present a unique challenge because of the balance between functionality and connectivity.

2015-08-14

Artificial Intelligence: Myths, Facts and Future

Should artificial intelligence be as smart as an average human?

2015-08-14

Darwinian Robotic Evolution

Artificial evolution of physical systems to create self-learning, improving robots.

2015-08-13

Artificial Intelligence Decodes ISIS

Artificial intelligence has been used to gain insights into the tactics of Islamic State.

2015-08-07

Internet of Things Unlocks Revenue Opportunities

Business is just beginning to see the potential of IoT & Big Data to create value.

2015-08-06

Cyber Wars Are Good For Tech Businesses

Trending Higher as Investors Pile In on Cyber Security. Two Companies To Watch Out For? Cyber Ark & Palo Alto.

2015-08-05

How Analytics Will Influence Connected Cars

Connected services like in-car Wi-Fi are driving the adoption of cloud-based vehicle platforms enabled by embedded 4G broadband.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

Riverbed Technology

Riverbed Technology

The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, accelerate and remediate the performance of any network for any application.

Acutec

Acutec

Acutec is an award winning IT support, services and solutions provider including managed IT Security and backup/disaster recovery.

NetDiligence

NetDiligence

NetDiligence is a privately-held cyber risk assessment and data breach services company.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

Strategic Cyber Ventures (SCV)

Strategic Cyber Ventures (SCV)

SCV grow cybersecurity companies that disrupt advanced cyber adversaries and revolutionize the cyber product marketplace.

Cyber Ireland

Cyber Ireland

Cyber Ireland brings together Industry, Academia and Government to represent the needs of the Cyber Security Ecosystem in Ireland.

Porto Research, Technology & Innovation Center (PORTIC)

Porto Research, Technology & Innovation Center (PORTIC)

PORTIC brings together several research centers and groups from P.PORTO in a single space, forming a superstructure dedicated to research, technology transfer, innovation and entrepreneurship.

Jamf

Jamf

Jamf is the only Apple Enterprise Management solution of scale that remotely connects, manages and protects Apple users, devices and services.

Node4

Node4

Node4 provide advanced, cloud-led digital transformation solutions, delivered with technical expertise, innovation and exceptional service to drive your business forwards.

Darkstrike / Qeros

Darkstrike / Qeros

Complete your defense in-depth strategy with Darkstrike, the world’s most advanced quantum-secure and ransomware-proof data platform for any use case, ensuring unconditional data security.

Worksent Technologies

Worksent Technologies

Worksent is a Trusted white-label offshore support partner for MSPs and MSSPs.

SECTA5

SECTA5

SECTA5 is a cybersecurity company building a next-generation Continuous Threat and Exposure Management platform, leveraging the expertise of offensively trained cyber defenders.

OpenZiti

OpenZiti

OpenZiti is the world’s most used and widely integrated open source secure networking platform. OpenZiti provides both zero trust security and overlay networking as pure open source software.

Edera

Edera

Edera is changing the way containers are run and secured, making isolation a reality and fundamentally transforming computing in the process.

DarkHorse Security

DarkHorse Security

DarkHorse exists to make it easy and affordable for organizations to be able to identify their cybersecurity vulnerabilities.