TECHNOLOGY > > Developments


« Back to News

2020-02-17

The Human Effect On AI Security

Although innovations in ArtificiaI Intelligence are transforming cybersecurity, the key high level aspects remain essentially human.

2020-02-10

Spies Really Like Artificial Intelligence

AI is helping US spy agencies reach analytical conclusions with instantaneous machine translation, speech recognition and data collection.

2020-02-07

What Is The Fuss About 5G?

The next generation of mobile Internet connection offers much faster data download and upload speeds. But there is more to it than that.

2020-02-05

Industry 4.0 - Changing How We Live

Few areas of our lives will remain untouched by the Fourth Industrial Revolution, which is changing how we personally engage, relate and work.

2020-02-04

Facial Recognition: A Three Billion Image Database

AI technology developed by Clearview allows the identification of anyone it images who has a presence online, not just on a crime database.

2020-02-03

Smart Cities Will Soon Be Under Attack

Smart Cities will be characterised by pervasive data collection and constant authentication, where giant surveillance systems are highly vulnerable.

2020-02-03

Mandatory IoT Security In Britain

The UK government has unveiled a new IoT law to prohibit the sale of smart consumer products that fail to meet three strict security requirements.

2020-01-30

President Putin Addresses The Russian Tech Gap

Russia embarks on a plan to modernise its economy with a new focus on technological innovation, starting with Artificial Intelligence.

2020-01-29

Britain Allows Huawei 5G Network Access Against US Advice

The UK Government has decided to give the contoversial Chinese company a significant role in building the UK’s 5G mobile and data network.

2020-01-21

5G Will Reduce Car Accidents

Connected car systems with 5G will enable data sharing to improve the effectiveness of advanced driver assistance systems and to save lives.

2020-01-20

Can A 5G Network Really Be Secure?

Governments in Australia, Britain and Germany are in difficulty over the choice of technology suppliers to establish their national 5G networks.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Willis Towers Watson

Willis Towers Watson

Willis Towers Watson is a global risk management, insurance brokerage and advisory company. Services offered include Cyber Risks insurance.

Sopra Steria

Sopra Steria

Sopra Steria is a leading European information technology consultancy.

Advisen

Advisen

Advisen is the leading provider of data, media, and technology solutions for the commercial property and casualty insurance market including cyber risk.

AKATI Sekurity

AKATI Sekurity

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

DFI

DFI

DFI is a global leading provider of high-performance computing technology across multiple embedded industries.

Data Theorem

Data Theorem

Data Theorem is a leading provider in modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere.

NeuShield

NeuShield

NeuShield is the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup.

Cyber Pathways

Cyber Pathways

Cyber Pathways brings together the next generation of Cyber professionals along with delegates who are looking to cross train and enter the cyber market.

AirEye

AirEye

AirEye is a leader in Network Airspace Protection (NAP). Block attacks against your corporate network launched from wireless devices in your corporate network airspace.

ITSEC Asia

ITSEC Asia

ITSEC Asia works to effectively reduce exposure to information security threats and improve the effectiveness of its clients' information security management systems.

BastionZero

BastionZero

BastionZero is leveraging cryptography to reimagine the tools used to manage remote access to servers, containers, clusters, applications and databases across cloud and on-prem environments.

ISSQUARED

ISSQUARED

ISSQUARED is a leading provider of Cyber Security, Cloud, Infrastructure, Consulting and Digital Transformation services.

Prescott

Prescott

Prescott acts as your guiding light in the preparation for your CMMC assessment and long after by governing your cybersecurity practice.

CYTUR

CYTUR

CYTUR provide trusted and secured maritime cybersecurity solutions to keep ships safe, protecting them, their crews, cargo and all stakeholders from maritime cyber threats.

Knowit

Knowit

Knowit support customers in the digital transformation, simplify people’s everyday lives and create secure and innovative solutions enabling a sustainable future.