TECHNOLOGY > > Developments


« Back to News

2023-05-26

Enabling Quantum-Safe Cryptography

End-To-End Solution: IBM has released a roadmap outlining the steps organisations can take to transition to quantum-safe cryptography.

2023-04-14

Highly Evasive Adaptive Threats & Advanced Persistent Threats

There's a new kind of attacker, one that has learned to weaponize the most crucial tool for knowledge workers today - the web browser. By Mark Guntrip

2023-04-10

The Dark Side Of The New Dawn In AI

What ChatGPT Means For Cyber Security: Reliance on a machine means we never know if we are being given the correct answers. By Rachael Greaves

2023-04-04

AI Revolution: The Future Is Here, Now

Artificial intelligence will change our lives, in ways both good and bad. But how confident can we be that we are prepared for what's coming?

2023-03-30

The Most Important Technology Advance In Decades

Bill Gates says Artificial Intelligence is as fundamental as the creation of the microprocessor, the PC, the Internet and the mobile phone.

2023-03-28

ChatGPT Language Model Risks

AI chatbots and Large Language Models (LLMs) present a rising security threat, the British National Cyber Security Agency has warned.

2023-03-22

Britain Pledges To Invest £2.5bn In Quantum Computing

Ambitious National Plan For AI: "A world-leading quantum-enabled economy by 2033" with a £2.5bn research and innovation programme

2023-03-13

A New Tool For Protecting ML Systems Security

Arsenal: Microsoft and Mitre have developed a plug-in that combines open-source software tools to protect Machine Learning systems from attacks.

2023-02-28

The Virtual & Real Cybersecurity Threats In The Metaverse 

Virtual World: The future of the metaverse as a usable interactive environment is doomed if we fail to properly secure it. By Spencer Starkey

2023-02-20

Technology Is Disrupting Intelligence & Espionage

New Surveillance Tools Use AI & Quantum: The power balance in the spy world is changing and closed societies have gained the edge.

2023-02-13

Quantum Computer Power Threatens Encryption

Quantum computers will completely transform data processing speeds and they can also be used by enemies for highly destructive modes of attack.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Center for a New American Security (CNAS)

Center for a New American Security (CNAS)

CNAS is the nation's leading research institution focused on defense and national security policy. Cyber security issues are an intrinsic element of the national security debate.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

GuidePoint Security

GuidePoint Security

GuidePoint Security provide information security solutions that enable commercial and federal organizations to more successfully achieve their security and business goals.

Georgia Cyber Center

Georgia Cyber Center

Georgia Cyber Center is dedicated to training the next generation of professionals through education and real-world practice while also supporting innovation in new technologies for online defenses.

NAVEX Global

NAVEX Global

NAVEX Global’s compliance management system consolidates your entire GRC program onto a scalable cloud-based platform.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

BigPanda

BigPanda

BigPanda is the first provider of Autonomous Operations solutions that empower IT Operations at large, complex enterprises.

Secure Ideas

Secure Ideas

Secure Ideas is focused on penetration testing and application security including web applications, web services and mobile applications.

SecurIT360

SecurIT360

SecurIT360 is a full-service specialized Cyber Security and Compliance consulting firm.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

CybersCool Defcon

CybersCool Defcon

CybersCool is committed to educate and train, re-skill and up-skill the current workforce of various industries and businesses in the knowledge and know-how of cybersecurity.

Harrison Clarke

Harrison Clarke

Harrison Clarke is a leading staffing and recruiting firm in the Cloud, Cybersecurity, Data & AI space.

Irys Technologies

Irys Technologies

Irys Technologies specialize in pioneering digital transformation solutions designed to streamline communications and enhance maintenance and operational efficiency for a variety of sectors.

IT-Schulungen.com / New Elements GmbH

IT-Schulungen.com / New Elements GmbH

Under the name IT-Schulungen.com, the Nuremberg-based New Elements GmbH has been operating one of the largest training centres in the German-speaking world for over 20 years.

Prizsm Technologies

Prizsm Technologies

Prizsm is a computational storage capability that provides flexible, easy-to-use, resilient solutions for quantum-resistant, hyper-secure cloud storage and communications.