TECHNOLOGY > > Developments


« Back to News

2019-09-28

Huawei Will Sell Its 5G Know-How

Huawei wants to address the widespread concerns over the integrity of its 5G network technology by licensing it to EU and US competitors.

2019-09-25

5G Needs A New Generation Of Security

5G networks can deliver much more data much faster, dramatically raising the stakes for ensuring the security & reliability of mobile communications.

2019-09-27

AI Is Changing The Cyber Security Landscape

Artificial Intelligence can be used to detect and prevent attacks before they take place, but it can also be a double-edged sword.

2019-09-23

Will Robots Be Allowed To Kill?

The advent of autonomous weapons demands some form of agreed international legal restrictions on their use. By Alfred Rolington

2019-09-23

Business Migration To The Cloud

Making the decision to migrate to the cloud can be daunting. The tools are different and large-scale migration is not something to be taken lightly.

2019-09-20

The Technology Of Human Robotics

Mechanical people, nano-robots and the blurring of human identity are in prospect as the technology of robotics advances. By Alfred Rolington

2019-09-18

AI - Driven Warfare Using Robots

Faster, more high-tech and less human than ever before. A new wave of artificially intelligent weapons are making their way to the battlefield.

2019-09-19

Smart Technology In The Cyber-Age

We are on the edge of a new ‘cyber’ space age. This is how we make it a success. By Kristof Terryn

2019-09-16

Using Blockchain Helps Secure Data Against Attacks

Strength In Numbers: To corrupt a blockchain, every system that processes it would have to be attacked, which could be thousands of systems.

2019-09-17

Smart Cities Call For Mobile Solutions

App-based physical security intelligence & access control technology that helps to build secure smart cities, campuses and perimeters.

2019-09-16

10 Predictions For The IoT Future

It’s not just about computers, laptops, tablets, and smartphones anymore. Now a multitude of devices are Internet-connected. What next?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Gamma

Gamma

Gamma is a leading provider of Unified Communications as a Service (UCaaS) into the UK, Dutch, Spanish and German business markets.

Covenco

Covenco

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do.

mmCERT

mmCERT

mmCERT is the national Computer Emergency Response Team for Myanmar.

International Computer Science Institute (ICSI)

International Computer Science Institute (ICSI)

ICSI is a leading independent, nonprofit center for research in computer science. Research areas include network security and privacy.

Cyber Security Research Centre - University of Cardiff

Cyber Security Research Centre - University of Cardiff

Cardiff University's Centre for Cyber Security Research is a leading UK academic research unit for cyber security analytics.

BioCatch

BioCatch

BioCatch uses behavioral biometrics for fraud prevention and detection. Continuous authentication for web and mobile applications to prevent new account fraud.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

BioConnect

BioConnect

BioConnect provide biometric access control solutions to verify a person’s identity across physical, IOT and digital applications.

McIntyre Associates

McIntyre Associates

McIntyre Associates is an Executive Search boutique specialized in recruiting for the Cybersecurity industry. Our clients range from Venture Capital backed startups to Fortune 100 companies.

Cypherix

Cypherix

Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages.

VeriClouds

VeriClouds

VeriClouds is a password verification service that helps organizations detect compromised passwords and stop account takeover attacks.

Mitnick Security

Mitnick Security

Mitnick Security is a leading global provider of information security consulting and training services.

Phished

Phished

Phished is an AI-driven platform that focuses on the human side of cybersecurity. By combining fully automated training software with personalised, realistic simulations of cyberattacks.

Telstra

Telstra

Telstra is one of the world's leading telecommunications and technology companies, offering a wider range of services from networks and cloud solutions to mobility and enterprise collaboration tools.

Cyber7

Cyber7

CYBER7 is a National Cyber Security Innovation community initiated by Israel National Cyber Directorate, Ministry of Economy and Israel Innovation Authority led by Tech7 – Venture Studio.

Rampart AI

Rampart AI

Tackling DevSecOps Issues In Application Security. Rampart has revolutionized the shift left security approach, applying zero-trust to application development.