TECHNOLOGY > > Developments


« Back to News

2022-07-08

Future Phishing Attacks Will Use Generative Machine Learning

Phishing attacks will get more sophisticated as criminals turn to Machine Learning techniques that can analyse datasets & generate attack vectors.

2022-06-17

Cloud Computing & Security: What Enterprises Should Know

What are the things that enterprises need to know regarding the maintenance of data in the cloud - is it really safe & secure? By Nicholas Parker

2022-06-01

Facing Facts On Facial Recognition

Clearview AI’s multi-million pound fine for breaching privacy marks a turning point for a public debate about surveillance levels. By Nigel Jones

2022-05-10

Special Measures To Deal With Quantum Technology

The US wants to speed up the domestic development of quantum technology, whilst adddressing the risks it presents to secure communications.

2022-04-20

Hackers Plan Attacks On Key US Industrial Control Systems

Hackers have new tools to get full system access to a number of Industrial Control System and Supervisory Control & Data Acquisition devices.

2022-04-06

The Metaverse Will Have An Impact On Privacy & Security

As augmented reality platforms develop into the Metaverse, users are going to be presented with entirely new categories of security risk.

2022-04-12

Deep-Fake Information Warfare

Machine Learning and AI will vastly imrove the ability to reach a mass audience with plausible content, making malicious actors even more powerful.

2022-03-12

New Tools To Detect Cyber Attacks

Automated monitoring of fluctuations in energy consumption across networks can help detect and protect critical IT infrastructure from hackers.

2022-03-09

Making Sense Of The Edge

Manufacturing’s big data has quickly become colossal, and Edge Computing can perform a vital role in the modern smart factory. By Martyn Williams

2022-03-09

NATO Tests A Post-Quantum VPN

Post-Quantum technology provides different powerful algorithms to ensure security, even when facing attackers using quantum computing.

2022-02-25

Drawbridge Wins ‘Best Cyber Security Solution’

Drawbridge has been selected as ‘Best Cyber-Security Solution’ at the Intelligence HFM US Quant Services Awards 2022.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Infinigate UK

Infinigate UK

Infinigate is a value-added distributor of IT security solutions to protect and defend IT networks, servers, devices, data, applications, as well as the cloud.

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

VietSunshine

VietSunshine

VietSunshine is a leading provider of network security infrastructure and solutions in Vietnam.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

Checksum Consultancy

Checksum Consultancy

Checksum Consultancy specializes in Information security, Risk management, and IT governance.

Hut Six Security

Hut Six Security

Train, test and track your Information Security culture through information security awareness training and customised phishing simulation campaigns.

Elevate Security

Elevate Security

Elevate is the leading Security Behavior Platform, changing employee security habits while giving security teams unprecedented visibility.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

HMS Networks

HMS Networks

HMS stands for Hardware meets Software. Our technology enables industrial hardware to communicate and share information with software and systems.

Axitea

Axitea

Axitea designs, implements and develops the solutions best suited to its customers’ needs and their physical and cyber security requirements.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

TempoCap

TempoCap

TempoCap is a European growth-stage technology fund with offices in London and Berlin. We invest across a variety of high- growth sectors including cybersecurity.

ThrottleNet

ThrottleNet

ThrottleNet provides world-class managed IT services and cybersecurity to organizations in St. Louis and throughout Missouri.

Silk Security

Silk Security

Silk is the first platform that enables enterprises to take a strategic, sustainable approach to resolving code, infrastructure and application risk.

CyberSalus

CyberSalus

CyberSalus is a pioneering cyber tech services company dedicated to protecting the digital integrity of healthcare organizations.