TECHNOLOGY > > Developments


« Back to News

2020-02-26

Organisations Are Adopting AI For Cyber Security

Over 70% of organisations are currently testing use cases for cyber security driven by Artificial Intelligence across a wide range of applications.

2020-03-04

Japan Approves Home Grown 5G

Japan intends to accelerate the development of 5G networks and will give financial support to local companies building this important new technology.

2020-02-21

Trends In Cyber Security Technology

Security teams struggle to make sense of a flood of data while simultaneously prioritising and responding to alerts. They need a lot more help.

2020-02-19

The Cloud Is Beginning To Attract Criminal Extortion

Mistakes made while setting up cloud permissions and policies create weak spots that attackers can exploit to deliver ransomware.

2020-02-19

Counting The Ways That AI Can Boost Business

Business leaders are growing more enthusiastic about using Artificial Intelligence to increase the speed and capabilities of their enterprise.

2020-02-17

The Human Effect On AI Security

Although innovations in ArtificiaI Intelligence are transforming cybersecurity, the key high level aspects remain essentially human.

2020-02-10

Spies Really Like Artificial Intelligence

AI is helping US spy agencies reach analytical conclusions with instantaneous machine translation, speech recognition and data collection.

2020-02-07

What Is The Fuss About 5G?

The next generation of mobile Internet connection offers much faster data download and upload speeds. But there is more to it than that.

2020-02-05

Industry 4.0 - Changing How We Live

Few areas of our lives will remain untouched by the Fourth Industrial Revolution, which is changing how we personally engage, relate and work.

2020-02-04

Facial Recognition: A Three Billion Image Database

AI technology developed by Clearview allows the identification of anyone it images who has a presence online, not just on a crime database.

2020-02-03

Smart Cities Will Soon Be Under Attack

Smart Cities will be characterised by pervasive data collection and constant authentication, where giant surveillance systems are highly vulnerable.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Qualitest Group

Qualitest Group

Qualitest is the world’s largest pure play Quality Assurance and software testing company.

SonicWall

SonicWall

SonicWall provide products for network security, access security, email security & encryption.

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

Awake Security

Awake Security

Awake Security offer a security solution built on an AI platform that acts like the human brain to sense, detect, and respond to threats you may not even know exist.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

Port53 Technologies

Port53 Technologies

Port53 Technologies is focused on delivering enterprise-grade, cloud-delivered security solutions that are easy to deploy, simple to manage and extremely effective.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

Reliance Cyber

Reliance Cyber

Reliance Cyber (formerly Reliance ACSN) help to monitor and manage your organisation’s security infrastructure 24/7, so you can make sure all threats and issues are dealt with.

KeyData Associates

KeyData Associates

KeyData is a recognized leader in cybersecurity services specializing in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM) and Privileged Access Management (PAM).

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP provides solutions and services around Core Infrastructure, Cloud, Cyber Security, Enterprise Applications, Intelligent Automation and Data, Smart Buildings, and Managed Services.

KT Secure

KT Secure

KTSecure’s mission is to provide proven and productive cyber security solutions and managed services, backed by our highly qualified and passionate team of experts.

AB Handshake

AB Handshake

AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic.

Oleria Security

Oleria Security

Oleria is the only adaptive and autonomous security solution that helps organizations accelerate at the pace of change, trusting that data is protected.

Genix Cyber

Genix Cyber

Genix Cyber provides world-class cybersecurity services that protect systems, cloud applications, infrastructure, critical data, and networks from evolving cyber threats.

OpenZiti

OpenZiti

OpenZiti is the world’s most used and widely integrated open source secure networking platform. OpenZiti provides both zero trust security and overlay networking as pure open source software.