TECHNOLOGY > > Developments


« Back to News

2022-07-06

Quantum Sensors Have Arrived

Ultra-precise time-keeping is the most important quantum-sensing achievement to date, adding precision to all other forms of sensing. 

2022-07-14

Coming Soon: Your Digital Twin

A digital twin is an exact replica of something in the physical world, but with a unique mission to test and improve the real-life version.

2022-07-08

Future Phishing Attacks Will Use Generative Machine Learning

Phishing attacks will get more sophisticated as criminals turn to Machine Learning techniques that can analyse datasets & generate attack vectors.

2022-06-17

Cloud Computing & Security: What Enterprises Should Know

What are the things that enterprises need to know regarding the maintenance of data in the cloud - is it really safe & secure? By Nicholas Parker

2022-06-01

Facing Facts On Facial Recognition

Clearview AI’s multi-million pound fine for breaching privacy marks a turning point for a public debate about surveillance levels. By Nigel Jones

2022-05-10

Special Measures To Deal With Quantum Technology

The US wants to speed up the domestic development of quantum technology, whilst adddressing the risks it presents to secure communications.

2022-04-20

Hackers Plan Attacks On Key US Industrial Control Systems

Hackers have new tools to get full system access to a number of Industrial Control System and Supervisory Control & Data Acquisition devices.

2022-04-06

The Metaverse Will Have An Impact On Privacy & Security

As augmented reality platforms develop into the Metaverse, users are going to be presented with entirely new categories of security risk.

2022-04-12

Deep-Fake Information Warfare

Machine Learning and AI will vastly imrove the ability to reach a mass audience with plausible content, making malicious actors even more powerful.

2022-03-12

New Tools To Detect Cyber Attacks

Automated monitoring of fluctuations in energy consumption across networks can help detect and protect critical IT infrastructure from hackers.

2022-03-09

Making Sense Of The Edge

Manufacturing’s big data has quickly become colossal, and Edge Computing can perform a vital role in the modern smart factory. By Martyn Williams

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

Anomali

Anomali

Anomali provides a threat intelligence platform for businesses to defend against today’s cyber security threats.

mmCERT

mmCERT

mmCERT is the national Computer Emergency Response Team for Myanmar.

EY Advisory

EY Advisory

EY is a multinational professional services firm headquartered in the UK. EY Advisory service areas include Cybersecurity.

Rosberg System

Rosberg System

Rosberg System solve the security challenges with connected devices on mobile networks by providing encrypted communications solutions.

First National Technology Solutions (FNTS)

First National Technology Solutions (FNTS)

First National Technology Solutions is a leading provider of flexible, customized hosted and remote managed services including IT security and compliance.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

Reservoir Labs

Reservoir Labs

Reservoir Labs' mission is to make the world safer, cleaner, more secure and more efficient through the application of radical high-performance computing technologies.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

MAD Security

MAD Security

MAD Security is a premier provider of information and cybersecurity solutions that combine technology, managed security services, support and training.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CloudBolt Software

CloudBolt Software

CloudBolt provide solutions for your toughest cloud challenges. From automation, to cost and security, and hybrid IT governance — we have you covered.

MDSec

MDSec

MDSec is a consultancy with a passion for information security. Our consultants specialise in application, mobile and hardware security and targeted red team attacks.

Nemstar

Nemstar

Nemstar is a specialist in Information Security & Cyber Training with over 25 years' industry experience.

Pionen

Pionen

Pionen are a specialist information security consultancy with excellent people and proven security delivery methodologies at its core.