TECHNOLOGY > > Developments


« Back to News

2018-01-24

What Is Fog Computing?

An architecture that distributes resources of computing, storage, control and networking along the continuum from Cloud to Things.

2018-01-24

Stuxnet: The Father Of Cyberkinetic Weapons

Its the 10th anniversary of the Stuxnet attack on the Iranian nuclear weapons program. The world’s first cyber weapon opened Pandora’s box.

2018-01-17

Applying Blockchain to Cybersecurity

Blockchain technology's key attribute is that it enables secure information transmission on the network with no human involvement. That's useful.

2018-01-17

AI Powers VW’s New Electric Microbus

VW is working with NVidia to deliver AI features to the next generation of its vehicles, like speech & gesture recognition and driver monitoring.

2018-01-23

AI Can Simplify The Purchasing Process For Business

US government workers and contractors could use AI to navigate regulations to make the federal purchasing process cheaper and less complex.

2018-01-15

VW and Hyundai To Offer Autonomous Cars

Self-driving taxis will be the staring point for autonomous vehicles offered by the big car companies as they link with technology partners.

2018-01-10

Pentagon Seeks Laser-Powered Bat Drones

Flying robots that move like living animals, crafted of next-generation materials that draw their power from energy beamed from nearby aircraft.

2017-12-29

Intelligent & Autonomous Security Robots

A new artificial intelligence technology that gives security guard robots the ability to communicate & deploy jointly at the same patrol site.

2017-12-19

Google To Open An AI Centre In Beijing

Google's search engine is blocked in China, yet both have ambitions to become AI superpowers and that's enough to overcome their differences.

2017-12-18

Russia Will Build A Separate Internet Directory

The Russian government plans to build an “independent internet” for BRIC nations as an alternative to the global Domain Name System .

2017-12-06

More Businesses Could Use Machine Learning

Few fields promise to “disrupt” life as we know it quite like machine learning, but many applications of machine learning technology go unseen.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

8MAN

8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments.

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity provide solutions for Secure Networks, Secure Communications, Network Analysis, and Endpoint Security.

Atos

Atos

Atos provides a unique Cyber Security end to end solution with a data-centric and pre-emptive security approach.

Sift

Sift

The Sift Digital Trust Platform protects your business and customers from all vectors of fraud and abuse through our Live Machine Learning, global trust network and automation technologies.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

Asvin

Asvin

Asvin provides secure update management and delivery for Internet of Things - IoT Edge devices.

Cynamics

Cynamics

Cynamics is the only network monitoring solution built specifically for Smart City, Public Safety and Critical Infrastructure networks.

GateKeeper Enterprise

GateKeeper Enterprise

The GateKeeper Enterprise software is an identity access management solution. Automated proximity-based authentication into computers and websites. Passwordless login and auto-lock PCs.

Telesign

Telesign

Telesign connect, protect, and defend online experiences with sophisticated digital identity and programmable communications solutions.

SecurityStudio

SecurityStudio

SecurityStudio is a continuous cybersecurity risk management platform that allows decision-makers to quickly identify the most immediate threats and make confident risk informed decisions.

ADNET Technologies

ADNET Technologies

ADNET Technologies is a SOC 2, Type II Compliant IT management and cybersecurity firm.

Kusari

Kusari

Securing your software supply chain starts with understanding. Kusari is on a mission to bring transparency to your software supply chain and power secure development.

VAST Data

VAST Data

The VAST Data Platform delivers scalable performance, radically simple data management and enhanced productivity for the AI-powered world.

Blockaid

Blockaid

Blockaid is the onchain security platform for monitoring, detecting, and responding to onchain and offchain threats.

Rankiteo

Rankiteo

At Rankiteo, we are pioneers in cybersecurity risk management. Our mission is to empower organizations with the tools they need to assess, enhance, and safeguard their digital landscapes.

OryxAlign

OryxAlign

OryxAlign offer managed IT and cyber security, cloud and digital transformation, and tailored professional and consulting services.