TECHNOLOGY > > Developments


« Back to News

2021-02-12

5G Will Disrupt Cyber Security

The transition to 5G will enable the connection of billions of new devices and means an overhaul of infrastructure.The stakes could not be higher.

2021-02-09

Everything You Need To Know About Hashing Algorithms

Hashing is a new method that aims to protect personal data and is widely used in cryptography and blockchain. How does it work?

2021-02-05

Pro-Active Cyber Protection

Antivirus tools are becoming ineffective against advanced attacks. Moving target endpoint defense technology from Morphisec is a powerful solution.

2021-02-01

Become a Robot & Live Forever

According to a futurologist, by 2050 humans will be able to integrate their brain with computers which might then be encased in a humanoid robot.

2021-02-01

5G Could Be A Cyber Security Revolution

Organisations implementing new security measures using 5G architecture are in the best position to protect themselves from being targeted.

2021-01-26

Financial Organisations Are Migrating To The Cloud

Financial services organisations are planning to optimise their cloud usage with investments in the hybrid cloud expected to grow significantly.

2021-01-19

The Most Important Technologies For 2021

Artificial Intelligence, Cloud Computing and the IoT are three new technologies that are going mainstream fast in a post Coronavirus world.

2021-01-15

The Coronavirus Is Increasing Investments In AI

One of the side effects of the Coronavirus is going to significantly speed up investments in both Artificial Intelligence and Nanotechnology.

2021-01-07

2021 Cyber Security Technologies

Forget about a single, all encompassing Firewall. Cyber security this year will move towards a much more proactive, interventionist approach.

2021-01-05

AI Will Soon Replace Cyber Security Staff

Cyber Security jobs will eventually be entirely automated and some professionals think that they will be replaced by AI in the next ten years.

Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

Repository of Industrial Security Incidents (RISI)

Repository of Industrial Security Incidents (RISI)

RISI is a database of cyber security incidents that have (or could have) affected process control, industrial automation or SCADA systems.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

Foresite

Foresite

Foresite is a global service provider, delivering a range of managed security and consulting solutions.

Quadron  Cybersecurity Services

Quadron Cybersecurity Services

Quadron Cybersecurity Services is a specialist in digital security, data and system protection.

Yelbridges

Yelbridges

Yelbridges is your reliable partner in all fields of IT-Security, from developing of Security Policies and Guidelines to the design and implementation of secure processes.

Cyber Wales

Cyber Wales

Cyber Wales is a flourishing cybersecurity ecosystem in Wales encompassing business, academia, government and cyber defence.

Cyway

Cyway

Cyway is a value-added cybersecurity distributor focusing on on-prem, cloud solutions and hybrid solutions, IoT, AI & machine learning IT security technologies.