TECHNOLOGY > > Developments


« Back to News

2020-07-17

Security Risks of Contactless Payment

Consumers are driving the push towards contactless payment, but like any technology, it comes with mobile security and data privacy risks.

2020-07-10

Cyber Security Technology To Protect Autonomous Vehicles

Collaboration between smart car manufacturers and cyber security experts is essential to establish standards in this emerging technology.

2020-07-02

Artificial Intelligence – A Brief History

AI is technology that enables a computer to think or act in a more 'human' way. It has a long history and has recently made incredible advances.

2020-06-30

Cloud Security Is Different

Migration to the Cloud for data and services has some risks that require new users to carefully rethink their approach to managing cyber security.

2020-06-30

Quantum Computing Will Have A Revolutionary Effect

Quantum computing will combine with IoT and AI to create a secure new network of digital and physical devices that will revolutionise industry.

2020-06-23

Using AI In Cyber Security

Advanced Artificial Intelligence and Machine Learning tools are becoming increasingly critical in detecting and combating cyber attacks.

2020-06-22

Is AI A Benefit Or A Potential Threat?

As Artificial Intelligence grows more sophisticated, concerns about the challenges its widespread use presents to humans are growing.

2020-06-09

Artificial Intelligence Takes Microsoft Jobs

Microsoft is firing 27 journalists to replace them with an AI, fueling the debate over whether the technology is a job creator or a destroyer.

2020-06-08

Britain Turns To AI To Counter Espionage

Cyber security threats require a speed of response far greater than humans are able to do and the spies at GCHQ want to use AI to do the job.

2020-06-03

US Police Display Powerful New Surveillance Tools

Drones, Geo-Tracking & Facial Recognition: US police are deploying a range of weapons previously unseen in a US domestic setting.

Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Verisec

Verisec

Verisec provides innovative solutions for digital identities and information security.

Cyber Technology Institute - De Montfort University

Cyber Technology Institute - De Montfort University

The Cyber Technology Institute provides training and high quality research and consultancy services in the fields of cyber security, software engineering and digital forensics.

SiteLock

SiteLock

SiteLock is a global leader in website security solutions.

GlobalSequr

GlobalSequr

GlobalSequr is an IT security consulting firm. We have a goal of demystifying the complexity of IT security.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

Computing Technology Industry Association (CompTIA)

Computing Technology Industry Association (CompTIA)

CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy.

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI) is an independent, global think-tank. We bring together the world’s top global researchers to undertake ground-breaking research on blockchain technology.

Perspecta

Perspecta

Perspecta security solutions predict attacks, proactively respond to threats, ensure compliance and protect data, applications, infrastructure and endpoints.

Data Privacy Office (DPO)

Data Privacy Office (DPO)

Data Privacy Office is a company that specializes in privacy and personal data protection, following the highest standards in its sector.