TECHNOLOGY > > Developments


« Back to News

2019-09-20

The Technology Of Human Robotics

Mechanical people, nano-robots and the blurring of human identity are in prospect as the technology of robotics advances. By Alfred Rolington

2019-09-18

AI - Driven Warfare Using Robots

Faster, more high-tech and less human than ever before. A new wave of artificially intelligent weapons are making their way to the battlefield.

2019-09-19

Smart Technology In The Cyber-Age

We are on the edge of a new ‘cyber’ space age. This is how we make it a success. By Kristof Terryn

2019-09-16

Using Blockchain Helps Secure Data Against Attacks

Strength In Numbers: To corrupt a blockchain, every system that processes it would have to be attacked, which could be thousands of systems.

2019-09-17

Smart Cities Call For Mobile Solutions

App-based physical security intelligence & access control technology that helps to build secure smart cities, campuses and perimeters.

2019-09-16

10 Predictions For The IoT Future

It’s not just about computers, laptops, tablets, and smartphones anymore. Now a multitude of devices are Internet-connected. What next?

2019-09-13

A Virtual Geospatial Fence On Network Access

Protection of IT networks requires a multi-layered approach that incorporates user training and security technologies, including Geo-fencing.

2019-09-12

AI Delivered Healthcare Creates Serious Legal & Ethical Issues

Use of Artificial Intelligence in medicine raises concerns over privacy, discrimination, psychological harm & doctor-patient relationships.

2019-09-10

What Is The Internet of Things?

Fast becoming the one of the most important changes in business, the IoT is also taking effect across government and social networks.

2019-09-02

Cyber Weapons Could Create Devastation Comparable To A Nuclear Strike

Cyber threats could be just as dangerous as a nuclear conflict, yet this is little understood by some governments and the public at large.

2019-08-20

Connected Cars Are The New Attack Vector

Hacking some smart devices might lead to nothing more than an invasion of privacy. Hacks of connected cars could be used for lethal purposes.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Norton Rose Fulbright

Norton Rose Fulbright

Norton Rose Fulbright is a global business law firm. Practice areas include Data protection, Privacy and Cybersecurity.

Dionach

Dionach

Dionach are a certified information security specialists who provide Penetration Testing, IT Security Auditing and Information Security Consultancy.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

IXDen

IXDen

IXDen provides a novel software-based approach to OT systems protection, covering Industrial IoT cybersecurity and sensor data integrity.

Trustify

Trustify

Trustify is a Managed Security Service Provider offering a suite of world-class Cyber Risk Management services.

Symmetry Systems

Symmetry Systems

Symmetry Systems is a provider of data store and object-level security (DSOS) solutions that give organizations visibility into, and unified access control of, their most valuable data assets.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

r00tz Asylum

r00tz Asylum

r00tz Asylum is a nonprofit dedicated to teaching kids around the world how to love being white-hat hackers.

Data Priva

Data Priva

Data Priva is the UK's leading subscription-based data protection, governance, risk and and compliance service.

Blackpanda

Blackpanda

Blackpanda is Asia’s premier cyber security incident response group, hyper-focused on digital forensics and cyber crisis response.

Intuitive Research & Technology Corp

Intuitive Research & Technology Corp

Intuitive Research and Technology is an aerospace engineering and analysis firm providing services to the Department of Defense, government agencies, and commercial companies.

Memcyco

Memcyco

Memcyco is a provider of cutting-edge digital trust technologies to empower brands in combating online brand impersonation fraud, and preventing fraud damages to businesses and their clients.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.

Linx Security

Linx Security

The Linx Identity Security platform enables identity, security, and IT ops teams to finally control the whole identity lifecycle.

Cyber Compliance Watch

Cyber Compliance Watch

Free index and notification of main new cyber security publications (standards and regulations) from agencies and regulators.

Telcion Communications Group

Telcion Communications Group

Telcion Communications Group provides communication and IT solutions to businesses and organizations throughout California and neighbouring states.