TECHNOLOGY > > Developments


« Back to News

2020-08-06

The Risk Of AI Being Used For Offensive Purposes

Many corporate cyber security teams are reliant upon outdated attack scenarios which are no longer resistant to AI-powered attacks.

2020-07-29

Vital Necessity Of Cloud Computing Highlights Security Risks

Orca Security's research finds that public cloud environments are rife with neglected workloads, authentication issues and lateral movement risk.

2020-08-03

Use Machine Learning To Predict What Is Most Likely To Be Exploited.

Risk-based vulnerability management helps you prioritize your remediation efforts to focus on the assets that matter most. Download Free e-Book.

2020-07-14

Huawei 5G Ordered Out Of UK Networks

Mobile operators will have to remove all the Chinese technology company's 5G equipment from their UK networks by 2027.

2020-07-28

Machine Learning Transforms Threat Detection

Machine Learning can shift the advantage towards defenders by significantly improving cyber threat detection in real time.

2020-07-28

Problems With Using Big Data For Policing

Algorithmic law enforcement: Police across the world are starting to use Big Data to help them to predict crime and analyse criminal methods.

2020-07-20

Blockchain - A Simple Idea With Complications

The basic idea is simple. It decentralises the storage of data so it cannot be controlled and manipulated by just one central user. So what?

2020-07-17

Security Risks of Contactless Payment

Consumers are driving the push towards contactless payment, but like any technology, it comes with mobile security and data privacy risks.

2020-07-10

Cyber Security Technology To Protect Autonomous Vehicles

Collaboration between smart car manufacturers and cyber security experts is essential to establish standards in this emerging technology.

2020-06-30

Cloud Security Is Different

Migration to the Cloud for data and services has some risks that require new users to carefully rethink their approach to managing cyber security.

2020-06-30

Quantum Computing Will Have A Revolutionary Effect

Quantum computing will combine with IoT and AI to create a secure new network of digital and physical devices that will revolutionise industry.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Ixia

Ixia

Ixia provides testing, visibility, and security solutions to strengthen applications across physical and virtual networks.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

Cybernance

Cybernance

Cybernance provide an enterprise-wide, web-based software solution for managing and mitigating cyber risk based on key compliance frameworks.

Khipu Networks

Khipu Networks

Khipu Networks is an award winning Cyber Security Company delivering a wide range of network, wireless and security solutions, technologies and services across multiple sectors.

Vdoo

Vdoo

Vdoo provides an end-to-end product security platform for automating all software security tasks throughout the entire product lifecycle.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute focuses on understanding, empowering and taking action across four critical areas driving continual improvement toward a safer, more secure cyber world.

Civic Technologies

Civic Technologies

Civic’s Secure Identity Platform (SIP) uses a verified identity for multi-factor authentication on web and mobile apps without the need for usernames or passwords.

Elysium Analytics

Elysium Analytics

Elysium Cognitive Security Analytics delivers the latest and most flexible security system to reduce cost and complexity while providing unmatched scalability.

Nemko

Nemko

Nemko offers testing, inspection, and certification services worldwide, mainly concerning products and systems, but also for machinery, installations, and personnel.

Packetlabs

Packetlabs

Packetlabs specializes in penetration testing services and application security.

ADL Consulting

ADL Consulting

ADL Consulting provide information security-related consultancy and training support to businesses across the UK. Our services include ISO27001, GDPR, Cyber Essentials and training.

AnyTech365

AnyTech365

AnyTech365 is a leading European IT Security and Support company helping end users and small businesses have a worry-free experience with all things tech.

Protexxa

Protexxa

Protexxa is a B2B SaaS cybersecurity platform that leverages Artificial Intelligence to rapidly identify, evaluate, predict, and resolve cyber issues for employees.

Mutare

Mutare

For three decades, Mutare has been empowering organizations to re-imagine a better way to connect through our transformative voice security, digital voice and text messaging solutions.

StrongBox IT

StrongBox IT

Strongbox IT provides solutions to secure web applications and infrastructure.