TECHNOLOGY > > Developments


« Back to News

2025-01-03

Artificial Intelligence Presents Urgent Risks

Potentially Very Dangerous Technology: An eminent scientist is warning that AI could wipe out the human race within the next decade.

2024-12-31

Ireland - The EU's Data Repository

The growth of the cloud storage sector in Ireland is so rapid that it is threatening the country’s legally binding commitments to 'Net-Zero'.

2025-01-02

Cybersecurity: What Can We Expect In 2025?

The prospect is for continued turbulence, shaped by evolving attack vectors, regulatory pressures & geopolitical conflict. By Vincent Lomba

2024-12-31

What Are The Key Trends That Will Shape Tech In 2025?

Weaponised AI & Compliance: Executives at NinjaOne identify four key trends that will shape the technology industry in 2025 and beyond. 

2024-12-23

A Guide to Understanding Market-Leading Data Storage Solutions

Data storage can be a matter of business survival. Cyber resilience, quick recovery & a robust storage strategy are vital. By Billy Conway

2024-12-18

General Motors Writes-Off $5bn On Robot Taxis

Autonomous vehicle technology turns out to be a lot harder than anticipated, as GM withdraws from the market, leaving it to Tesla & Waymo.

2024-12-17

The Proliferation Of Open Source Malware

Sonatype reports a 156% increase in open source malware in 2024, estimating that 50% of unprotected repositories contain open source malware.

2024-11-14

Five Best Practices For Secure & Scalable Cloud Migration

Lift & Shift: Follow these five battle-tested best practices to ensure your cloud migration transforms capabilities, not create headaches. 

2024-10-18

Four Reasons To Migrate Your Business To The Cloud

A Sound Migration Strategy: Many more companies are adopting cloud computing as a core part of their operations. Here are the reasons why.

2024-10-22

Celebrating 10 Years Of Kubernetes

The Journey To Date & What’s Next: Kubernetes is so embedded that it’s almost impossible to imagine life without it. By Rani Osnat

2024-10-21

Nowhere To Run

Killing As A Video Game: Lethal automated drones are moving from human directed targeting to pre-programmed targeting. By Ron Marks

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DataGuidance

DataGuidance

DataGuidance is a platform used by privacy professionals to monitor regulatory developments, mitigate risk and achieve global compliance.

ClearedJobs.Net

ClearedJobs.Net

ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities.

CERT-PY

CERT-PY

CERT-PY is the national Computer Emergency Response Team for Paraguay.

Materna Radar Cyber Security

Materna Radar Cyber Security

Radar Cyber Security is the only European supplier of Managed Detection & Response who provides its services based on inhouse developed technology.

Cybersecurity Tech Accord

Cybersecurity Tech Accord

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies.

ECOLUX

ECOLUX

ECOLUX is a professional IoT security service company committed to developing world-leading “IoT Lifecycle Security” technologies and products.

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node is part of a national network designed to foster and accelerate cyber capability and innovation across Australia.

Network Center Inc (NCI)

Network Center Inc (NCI)

NCI is one of the largest IT solution providers in the Midwest. We specialize in industry specific technology solutions, service, support, and expertise for small to enterprise businesses.

IntelliGenesis

IntelliGenesis

IntelliGenesis provide comprehensive cyber, data science, analysis, and software development services that provide tailored, secure solutions for your critical data and intelligence needs.

Synamic Technologies

Synamic Technologies

Synamic Technologies was founded in 2018 as a start-up to automate cyber security processes. Our CISOSCOPE product automates vulnerability management, risk management and compliance.

SilverEdge Government Solutions

SilverEdge Government Solutions

SilverEdge is a next generation provider of innovative and proprietary cybersecurity, software, and intelligence solutions for the Defense and Intelligence Communities.

ClearShark

ClearShark

Since 2001, ClearShark has been a go-to adviser in the U.S. Public Sector for creating customized and integrated solutions for the most secure of networks.

Descope

Descope

Descope is a service that helps every developer build secure, frictionless authentication and user journeys for any application.

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.

DataPatrol

DataPatrol

DataPatrol is a software company, specialized in providing Security and Privacy of company’s data and information in an evolved way.

FatPipe Networks

FatPipe Networks

FatPipe’s network optimization solutions along with robust native security and SASE-based protection provides organizations all they need for super network performance and security.