TECHNOLOGY > > Developments


« Back to News

2021-03-04

Connected Cars & Cyber Security

An increase in malicious attacks arising from the wider adoption of connected vehicles is driving growth in the automotive cyber security market.

2021-02-16

3D Secure Authentication: What Is it, And Why Do I Need It?

3D Secure Authentication uses layers of consumer and merchant information to provide additional security for online purchases. By George J Newton

2021-02-12

5G Will Disrupt Cyber Security

The transition to 5G will enable the connection of billions of new devices and means an overhaul of infrastructure.The stakes could not be higher.

2021-02-09

Everything You Need To Know About Hashing Algorithms

Hashing is a new method that aims to protect personal data and is widely used in cryptography and blockchain. How does it work?

2021-02-05

Pro-Active Cyber Protection

Antivirus tools are becoming ineffective against advanced attacks. Moving target endpoint defense technology from Morphisec is a powerful solution.

2021-02-01

Become a Robot & Live Forever

According to a futurologist, by 2050 humans will be able to integrate their brain with computers which might then be encased in a humanoid robot.

2021-02-01

5G Could Be A Cyber Security Revolution

Organisations implementing new security measures using 5G architecture are in the best position to protect themselves from being targeted.

2021-01-26

Financial Organisations Are Migrating To The Cloud

Financial services organisations are planning to optimise their cloud usage with investments in the hybrid cloud expected to grow significantly.

2021-01-19

The Most Important Technologies For 2021

Artificial Intelligence, Cloud Computing and the IoT are three new technologies that are going mainstream fast in a post Coronavirus world.

2021-01-15

The Coronavirus Is Increasing Investments In AI

One of the side effects of the Coronavirus is going to significantly speed up investments in both Artificial Intelligence and Nanotechnology.

2021-01-07

2021 Cyber Security Technologies

Forget about a single, all encompassing Firewall. Cyber security this year will move towards a much more proactive, interventionist approach.

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Australian Information Security Association (AISA)

Australian Information Security Association (AISA)

AISA champions the development of a robust information security sector by building professional capacity and advancing the cyber security of the public, business and governments in Australia.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

Milton Security Group

Milton Security Group

Milton Security develops products to provide security, visibility and control over your network to keep it Operational and Secure.

PeCERT

PeCERT

PeCERT is the national Computer Emergency Response Team for Peru.

BGD E-GOV CIRT

BGD E-GOV CIRT

BGD e-GOV CIRT's mission is to support government efforts to develop ICT programs by establishing incident management capabilities within Bangladesh.

TwinTech Solutions

TwinTech Solutions

TwinTech Solutions provide compliance, penetration testing, digital forensics, and cyber security training services.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

IPACSO

IPACSO

IPACSO is a project aimed at supporting the development of innovative cyber security and privacy related activities in Europe.

Network Center Inc (NCI)

Network Center Inc (NCI)

NCI is one of the largest IT solution providers in the Midwest. We specialize in industry specific technology solutions, service, support, and expertise for small to enterprise businesses.

Collins Aerospace

Collins Aerospace

Collins Aerospace provides cybersecurity services and systems to protect critical infrastructure facilities and railroad operations.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

VirtualArmour

VirtualArmour

VirtualArmour is a managed security services provider with global reach and local attitude.

Samurai Digital Consulting

Samurai Digital Consulting

Samurai Digital Security are a cyber and Information security services provider, specialising in penetration testing, incident response, user awareness and information governance solutions.

ZARIOT

ZARIOT

ZARIOT's mission is to restore order to what is becoming connected chaos in IoT by bringing unrivalled security, control and quality of service.

West Midlands Cyber Resilience Centre (WMCRC)

West Midlands Cyber Resilience Centre (WMCRC)

The East Midlands Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

BOTS

BOTS

BOTS Inc is an emerging innovator of products, technologies, and services for new markets using cryptocurrency and technology solutions on Blockchain platforms.