TECHNOLOGY > > Developments


« Back to News

2024-07-16

Self-Regulation In The Email Provider Market

A New Chapter For Cybersecurity: DMARC enhances email security, reducing phishing & other email-based attacks. By Gerasim Hovhannisyan

2024-07-05

Inside The Mind Of A CISO

The AI Express: CISOs are divided in their attitude over what AI will mean for their organization and their own roles. By Nick McKenzie 

2024-07-05

UK vs. US: The Artificial Intelligence Landscapes Compared

Innovation Vs Pragmatism: While the US and UK are at the forefront of AI development, their approaches diverge significantly. By Bill Conner

2024-07-15

Journalism’s Future With AI

Artificial Intelligence is transforming many industries. The future of journalism and the whole content creation business is changing with it.

2024-07-01

Safeguarding Enterprises & Individuals In The IoT Era

The Internet of Things introduces significant privacy & security risks that must be addressed to safeguard enterprises. By John Linford

2024-06-25

The Psychology Of GenAI Manipulation

A Deep Dive Into Human Tactics: GenAI bots can be tricked into divulging sensitive information, placing organisations at risk. By John Blythe

2024-06-24

Leveraging The Benefits Of LLM Securely 

Holistic protection across the cloud native application lifecycle will enable business to embrace the full potential of GenAI. By Gilad Elyashar

2024-06-20

Artificial Intelligence Is Changing Education 

The widespread introduction of  AI has taken only a few months for Generative AI and ChatGPT to change education.

2024-05-31

Safeguarding Data In The Quantum Computing Era

Quantum Apocalypse: Now is the time to start learning about existing quantum-resistant encryption technologies & solutions. By Prof. Nigel Smart

2024-05-13

Defending Space Assets From Emerging Threats

Urgent challenges exist in securing space-based technologies against cyber threats and risks to critical infrastructure. By Sylvester Kaczmarek

2024-04-30

Protecting OT With MDR

Managed Detection & Response: How to beat the rising tide of cyber attacks in Operational Technology driven environments. By Yannis Velitsikakis

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

AA Certification (AAC)

AA Certification (AAC)

AAC provide ISO Quality Management System certification services including ISO 27001.

Georgia Cyber Center

Georgia Cyber Center

Georgia Cyber Center is dedicated to training the next generation of professionals through education and real-world practice while also supporting innovation in new technologies for online defenses.

Ellipsis Technologies

Ellipsis Technologies

Ellipsis Technologies is a diversified technology company that develops innovative security software for websites and online applications.

Zecurion

Zecurion

Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest and in motion.

Relyum

Relyum

Relyum provides innovative solutions for networking, synchronization and cybersecurity in critical systems.

Kippeo Technologies

Kippeo Technologies

Kippeo is a security systems integrator providing innovative solutions that look at all the parameters and connect all the dots.

Fortalice

Fortalice

Fortalice provide customizable consulting services built on proven methodology to strengthen your business cyber security defenses.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

AlertSec

AlertSec

AlertSec Ensure is a U.S. patented technology that allows you to educate, verify and enforce encryption compliance of third-party devices.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

Aligned Technology Solutions (ATS)

Aligned Technology Solutions (ATS)

ATS manage, monitor, and maintain everything from your network and servers to your workstations and mobile devices, and we do it proactively to eliminate downtime and keep hackers at bay.

Truesec

Truesec

TRUESEC has an exceptional mix of IT specialists. We are true experts in cyber security, advanced IT infrastructure and secure development.

Horizon3.ai

Horizon3.ai

Horizon3.ai is a leader in security assessment and validation enabling continuous security overwatch from an attacker’s perspective through our NodeZero SaaS solution.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.