TECHNOLOGY > > Developments


« Back to News

2017-08-09

@Home With iRobots

Is it possible that one of the impacts of virtual reality will be better indoor maps of the reality we are already in - or is it just eroding privacy?

2017-08-04

5G Wireless Technology - Enabling Mobile-Only Networking

5G is about the evolution of cellular from wireline augmentation to wireline replacement, and strategically from mobile-first to mobile-only.

2017-08-07

US Tries To Keep Up with Terrorists Tech

Terrorists are striving to use unmanned systems, especially airborne platforms, to deploy new threats. The US military is racing to keep up.

2017-07-31

IoT Is Becoming A Nightmare For IT

The Internet of Things, at its simplest level, is about connecting smart devices but it is far from a simple challenge for IT departments.

2017-07-26

Key Concepts For Understanding Artificial Intelligence

AI has innovative uses across all industry segments, helping diagnose and solve problems faster and enabling consumers to do amazing things.

2017-07-25

Can We Stop Algorithms Telling Lies?

Most important moments where people interact with large bureaucratic systems involve an algorithm in the form of a scoring system. That's a problem.

2017-07-25

The Impact Of AI On Employment Demands New Thinking

The challenge of protecting traditional jobs from the impact of globalisation will be further complicated by the effects of AI and automation.

2017-07-24

Google Wants To Mimic The Human Brain

Google is proposing a template for creating a single machine learning model that can address multiple tasks, emulating human intelligence.

2017-07-18

AI And Robotics Can Fight Cyber Crime

New techniques in AI, Machine Learning and Quantum Computing can massively improve the speed of cyber crime detection & prevention.

2017-07-14

Biometric Products Can Help Cybersecurity

65 percent of large firms in the UK detected a cybersecurity breach or attack in the past year. Adding biometrics to cybersecurity could fix that.

2017-07-13

AI For Effective Healthcare Cyber Resilience

Healthcare CISOs should recognise that AI has the ability to enhance the identification of malicious activity and to protect systems and data from attackers.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XenArmor

XenArmor

XenArmor products include NetCertScanner, an enterprise software to scan & manage expired SSL Certificates on your local network or internet.

CyberSeek

CyberSeek

CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.

OEDIV SecuSys

OEDIV SecuSys

OEDIV SecuSys (formerly iSM Secu-Sys) develops high-quality IT software solutions, setting standards as a technology leader in the area of identity and access management.

NSEIT

NSEIT

NSEIT offers end-to-end Information Technology products, solutions and services including cybersecurity to organizations in the financial sector.

Cyberens

Cyberens

Cyberens provide cybersecurity consulting services in IT sectors relating to defense and space, banking, industrial control systems and IoT.

Kapalya

Kapalya

Kapalya empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

IT Jobs Watch

IT Jobs Watch

IT Jobs Watch provides a concise and accurate map of the prevailing IT job market conditions in the UK.

Kinetic Investments

Kinetic Investments

Kinetic Investments provide entrepreneurs with the capital and support required to transform their vision into a success, in return for shared ownership of the company.

Tide Foundation

Tide Foundation

Tide's breakthrough multi-party-cryptography enables TRUE-zero-trust technology that unlocks cyber-herd immunity.

Infinipoint

Infinipoint

Infinipoint pioneers the first Device-Identity-as-a-Service (DIaaS) solution, addressing Zero Trust device access and enabling enterprises of all sizes to automate cyber hygiene.

Veriti

Veriti

Veriti is a unified security posture management platform that integrates with your security solutions and proactively identifies and remediates potential risks and misconfigurations.

e-Xpert Solutions

e-Xpert Solutions

e-Xpert Solutions is a company specialized in the Information Security field since 2001. Our skills are strong technical expertise and the development of tailor-made solutions.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

Forward Global

Forward Global

Forward Global designs and delivers services and technologies to manage digital, economic, and information risks.