TECHNOLOGY > > Developments


« Back to News

2022-12-27

Preventing Insider Threats In Kubernetes Clusters

Secure Your Kubernetes Clusters From Inside Threats. The basics of insider threats and how to prevent it in Kubernetes. By Gilad David Mayaan

2022-10-05

The Metaverse: A Reality Check

The Metaverse is like a whole new Internet that people are unfamiliar with - a guarantee that both businesses and consumers will be exploited.

2022-10-05

Blockchain Is The New IoT Standard

Blockchain identity standardisation is critical to ensure inter-operability between Internet of Things devices, systems, people and businesses. 

2022-09-30

Why Companies Need A Next-Gen Approach To Business Continuity

IT teams must reevaluate their approach to business continuity to withstand the threats coming at them fast and furious. By Florian Malecki

2022-09-27

Securing The Future Of Open Finance

Financial-Grade Security: The adoption of Open Banking raises critical cyber security concerns over outdated systems. By Jacob Ideskog

2022-09-23

Quantum Computing Raises As Many Problems As It Solves

Quantum computing poses both opportunities and risks to the cyber security environment and above all, a serious threat to encrypted communications.

2022-09-13

Evil Has New Cyber Weapons

TeslaGun: The Evil Corp ransomware gang, best known for Dridex banking malware, has expanded its cyber weapons arsenal to include cryptomining.

2022-09-07

The Quantum Internet Could Be Immune To Cyber Attack

Researchers at Eindhoven University of Technology are developing technology capable of delivering a fast and unhackable quantum Internet. 

2022-09-01

Digital Banking & Cyber Crime

Digital banks face rapidly escalating threats as technological developments in cyber crime make it easier than ever for financial criminals. 

2022-08-23

Technology To Combat Human Trafficking

AI, Facial Recognition & Blockchain: There are a growing number of ways in which technology can be applied to combat human trafficking.

2022-07-22

Migrating to the Cloud: Security Risks and Concerns

Many companies are hesitant about Cloud migration because of security concerns, but that's a shared responsibility with the provider. By Clive Madders

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Arcitura Education

Arcitura Education

Arcitura is a leading global provider of progressive, vendor-neutral IT training and certification programs.

XBOSoft

XBOSoft

XBOSoft is a software QA and testing company. We cover the entire QA and testing life cycle including software and application security.

Crest International

Crest International

Crest is focused on professionalizing the technical cyber security market whilst driving quality and standards of organizations that operate within it.

Seceon

Seceon

Seceon OTM, is a cyber security advanced threat management platform that visualizes, detects, and eliminates threats in real time.

DG Technology

DG Technology

DG Technology focuses on delivering a comprehensive security strategy, solutions and protection across all platforms from desktop to mainframe.

VerifyMe

VerifyMe

VerifyMe is a global technology solutions company delivering brand protection offerings to mitigate counterfeiting, product diversion, and illicit trade.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

LMG Security

LMG Security

LMG Security is a cybersecurity consulting, research and training firm.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

Cingo Solutions

Cingo Solutions

Cingo Solutions is a Managed Detection & Response company providing specialized data security services.

Secure Blockchain Technologies (SBT)

Secure Blockchain Technologies (SBT)

SBT is a team of Enterprise IT Security Professionals weaving security and Blockchain Technology into our customer’s operational fabric.

WidePoint

WidePoint

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions.

Pelion

Pelion

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

Nisos

Nisos

Nisos provides unrivaled protection of your reputation and assets through the practice of Active Defense.

Green Enterprise Solutions

Green Enterprise Solutions

Green Enterprise Solutions are a Namibian company providing Information and Communication Technology (ICT) services to corporate Namibia.

NextGen Cyber Talent

NextGen Cyber Talent

NextGen Cyber Talent is a non-profit providing a platform to increase diversity and inclusion in the cybersecurity industry.