TECHNOLOGY > > Developments


« Back to News

2022-04-12

Deep-Fake Information Warfare

Machine Learning and AI will vastly imrove the ability to reach a mass audience with plausible content, making malicious actors even more powerful.

2022-03-12

New Tools To Detect Cyber Attacks

Automated monitoring of fluctuations in energy consumption across networks can help detect and protect critical IT infrastructure from hackers.

2022-03-09

Making Sense Of The Edge

Manufacturing’s big data has quickly become colossal, and Edge Computing can perform a vital role in the modern smart factory. By Martyn Williams

2022-03-09

NATO Tests A Post-Quantum VPN

Post-Quantum technology provides different powerful algorithms to ensure security, even when facing attackers using quantum computing.

2022-02-25

Drawbridge Wins ‘Best Cyber Security Solution’

Drawbridge has been selected as ‘Best Cyber-Security Solution’ at the Intelligence HFM US Quant Services Awards 2022.

2022-02-15

Making Security Seamless - The Common Identity Platform

By establishing a Common Identity Platform, it is perfectly possible to achieve a seamless identity management service. By Jacob Ideskog

2022-02-09

High-Tech Lie Detection Systems

Brain-scanning technologies & cheaper computing power offer powerful new lie-detection tools based on measuring cognitive changes.

2022-02-02

Winner: NSA Best Cyber Security Research Paper

The US spy agency runs an annual competition to find the best cyber security scientific research. This year's winner is all about cryptography.

2022-01-31

Artificial Intelligence Is Increasingly Important In Cyber Security 

Force Multiplier: AI offers major advantages for protecting people, systems & organisations from the relentlessly growing range of cyber threats.

2022-01-11

Super Intelligent Machines Need An Off Switch

They’re Already Here: An AI system with superior intelligence to humans could learn independently & have access to all the data of humanity.

2022-01-10

What To Expect From Data Science In 2022

What's Going On: Data science is being applied to multiple industries for different purposes across a broad range of business operations.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Thales

Thales

Thales provides solutions, services and products that help its customers in the defence, aeronautics, space, transportation and digital identity and security markets to fulfil their critical missions.

Cybereason

Cybereason

Cybereason provides real-time detection of malicious activity enabling you to identify the cause and scope of an attack and ensure an effective response.

National Defence Radio Establishment (FRA) - Sweden

National Defence Radio Establishment (FRA) - Sweden

The National Defence Radio Establishment (Försvarets Radioanstalt), is the Swedish national authority for Signals Intelligence, also providing Information assurance services to government authorities.

Cavirin

Cavirin

Cavirin’s Automated Risk Analysis Platform reduces risk and automates security and compliance.

(ISC)2

(ISC)2

(ISC)² is an international, nonprofit membership association for information security leaders. Our information security certifications are recognized as the global standard for excellence.

Holm Security

Holm Security

Holm Security are taking vulnerability assessment into the next generation as a cloud service.

Prompt

Prompt

Prompt supports the creation of partnerships and the setting up of industrial-institutional applied R&D projects for all ICT sectors.

SOC.OS Cyber Security

SOC.OS Cyber Security

SOC.OS is an alert correlation and triage automation tool. It correlates and prioritises your alerts, boosting productivity, enhancing threat visibility and shortening mean time to respond.

Toothpic

Toothpic

ToothPic has invented, designed, developed and patented a solution to enable companies to turn every smartphone into a secure key for a user-friendly online authentication.

Naq Cyber

Naq Cyber

Naq is the number one platform for SMEs looking to become legally compliant and protect against cybercrime and other data-related incidents.

Torq

Torq

Torq's no-code automation modernizes how security & operations teams work with easy workflow building, limitless integrations and numerous pre-built templates.

Identity Digital

Identity Digital

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities.

Vaultinum

Vaultinum

Vaultinum are a trusted independent third party specialized in the protection and audit of digital assets.

Radius Technologies

Radius Technologies

Radius Technologies is trusted by progressive SMEs to deliver world-class cloud, IT solutions, IT and data security, and telecoms systems.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.