TECHNOLOGY > > Developments


« Back to News

2021-01-05

AI Will Soon Replace Cyber Security Staff

Cyber Security jobs will eventually be entirely automated and some professionals think that they will be replaced by AI in the next ten years.

2021-01-04

AI Is The New Weapon In The Cyber Arms Race

Many experts believe that ArtificiaI Intelligence will have a significant impact on warfare and will transform how armed conflict is conducted.

2020-12-16

Europol Warning Of The Growing AI Cyber Threat

AI will become increasingly popular among cyber criminals who are beginning to use it to target their victims and to maximise hacking operations.

2020-12-10

Connected Devices Must Be More Secure

The US will establish baseline security standards for IoT manufacturers and require contractors to implement vulnerability disclosure policies.

2020-12-01

Britain Bans Huawei 5G

The UK government will ban new Huawei technology from the national telecoms network from September of 2021 - much earlier expected.

2020-11-20

Why Real-Time Data Matters To The Maritime Industry

Maritime companies are using Big Data tools and Cloud-based sytems to drive operational efficiency. Keeping the data secure is a big issue.

2020-11-23

Artificial Intelligence In The Cyber Security Market

AI can bring instant insights and faster response times to cyber threats and the market is forecast to generate $100billion in revenue by 2030.

2020-11-25

Is AI The Future of Cyber Security?

Artificial Intelligence can detect those small danger signs that otherwise might go undetected by humans and can halt hackers in their tracks.

2020-11-20

AI Speeds Up Government Policy Decisions

On Trend: The Japanese government plans to introduce an Artificial IntelIigence data analysis system to speed their policy decision making.

2020-11-16

Using Artificial Intelligence In Business

AI has become a key component in cyber security infrastructure for every business, providing a sophisticated, multi-layered security strategy.

Perimeter 81

Directory of Suppliers

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Feitian Technologies

Feitian Technologies

Feitian Technologies provides authentication and transaction security products for financial institutions, telecoms, government and leading business enterprises.

Trend Micro

Trend Micro

Trend Micro is a leader in hybrid cloud, endpoint, and network security solutions.

CloudCheckr

CloudCheckr

CloudCheckr is a next-gen cloud management platform that unifies Security & Compliance, Inventory & Utilization and Cost Management.

X-act Forensics

X-act Forensics

X-act forensics are computer forensic experts with experience in cases of computer fraud, intellectual property theft, and social networking cases.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

Gulf IT Solutions

Gulf IT Solutions

Gulf Computer Services is a major player in the field of networking & Communication solutions for emerging industries such as Internet Services and Information Technology in Saudi Arabia.

Block Blox

Block Blox

Block Blox is a blockchain consulting company. Services include Smart Contract & Infrastructure Security Audits, Security Token Issuance and Regulatory Compliance Support.