TECHNOLOGY > > Developments


« Back to News

2021-09-09

Microsoft Will Invest $20Billion In Cyber Security

Microsoft have responded to President Biden's cyber intitiative and will spend four times the previous level of investment over the next 5 years.

2021-08-30

Urgent Action By Microsoft To Protect Cloud Users

A massive flaw discovered in the main databases stored in the MS Azure cloud platform means that all users need to change their digital access keys.

2021-08-26

Big Data & Cloud Computing - Concurrent Technologies Of The Digital Revolution

The storage & processing of massive quantities of internet data sparked the simultaneous usage of big data and cloud computing. By Ryan Jason

2021-08-04

New Tools Optimise Use Of Existing Data

Advances in cloud-based analytic tools are providing cost-effective operational improvements to ageing IT systems across many sectors.

2021-05-14

Automation & Industry 4.0

Industry 4.0 is a concept of creative convergence, similar to the evolutionary transition from single celled organisms to functioning organic networks.

2021-05-04

Risks Of Bias In ‘Emotional AI’

Facial recognition mass surveillance software used to scan crowds to detect doubt and anger as emotions that indicate potential threats, is not safe.

2021-04-30

Why Kubernetes Is The Future Of Cloud Computing

Kubernetes is an open-source container-orchestration system for automating computer applications. So what? By Stella Lincoln

2021-04-28

Better Cyber Security For Smart Devices

Secure by Design: The British government is working to ensure consumer "smart" devices are more secure, with security built in from the start.

2021-04-27

Industry 5.0 Will Transform The Workplace

Connectivity: Just when you were starting to get a handle on Industry 4.0, the next technolgical step change has already begun to take shape.

2021-04-15

Making 2FA More Secure

2FA provides a way of 'double checking' that you really are the person you are claiming to be and new technology applies this to facial movements.

2021-04-09

The Future Of Blockchain In Cyber Security

Blockchain technologies are the culmination of decades of research into cryptography and have an inherent connection to cyber security.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

Deutsche Cyber-Sicherheitsorganisation (DCSO)

Deutsche Cyber-Sicherheitsorganisation (DCSO)

DCSO is an IT security specialist with a focus in three areas - technology management, managed security services, security consulting and auditing.

IT2Trust

IT2Trust

IT2Trust is one of Scandinavia’s leading value-added distributors of business-critical IT solutions within IT security and networking.

TokenOne

TokenOne

TokenOne is a Cyber Security software company that makes it easy to replace passwords, tokens and other forms of authentication with a more secure solution.

Veracity Industrial Networks

Veracity Industrial Networks

Veracity provides an innovative industrial network platform that improves the reliability, efficiency, and security of industrial networks and devices.

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

BELAC

BELAC

BELAC is the national accreditation body for Belgium.

X4 Technology

X4 Technology

X4 Technology is a leader in finding the very best technology talent for some of the world’s most innovative start-ups and globally recognised brands.

EBRAND Services

EBRAND Services

EBRAND, the European experts for brand protection on the Internet. We offer a full set of services including cybermonitoring, fighting counterfeiting offences and online security.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

Tromzo

Tromzo

Tromzo's mission is to eliminate the friction between developers and security so you can scale your application security program.

Condition Zebra

Condition Zebra

Condition Zebra has wide experience in providing IT Security Services, Training, and Certification in the field of cybersecurity.

CentriVault

CentriVault

CentriVault is a leading independent provider of Cyber Security and Data protection services to small and medium enterprises (SMEs).

Radix Technologies

Radix Technologies

Radix offer end-to-end device management solutions, consolidating all the organization devices, processes and stakeholders into one easy-to-use management platform.

TetherView

TetherView

TetherView provides leading virtual desktop and email security technology to help businesses stand up and manage digital workspaces.

Digital Security Authority (DSA)

Digital Security Authority (DSA)

The establishment of the Digital Security Authority, which incorporates the National CSIRT, is crucial to significantly raising the cybersecurity posture and capabilities of Cyprus.