TECHNOLOGY > > Developments


« Back to News

2015-11-10

Military Robots Will Predict Your Next Move

New research may enable robotic-armed guards, or just help self-driving cars get through a four-way stop.

2015-11-04

Bitcoin Groups and Law Enforcement Unite

A group of digital currency companies and law enforcement agencies are getting together to improve communication with government.

2015-11-03

U.S Navy Plans To Deploy A Submarine Drone Squadron By 2020

Submarine drones that can operate with minimal human intervention close to vital areas and sensitive targets

2015-10-19

IBM's Watson Analytics - New Data Discovery

New Analytics include Expert Storybooks: data discovery models to help users discover patterns & relationships enabling predictive decisions.

2015-10-15

Blackphone: Privacy-obsessed Smartphone

Silent Circle has released a second version of its signature smartphone designed to defeat tracking and interception.

2015-10-15

The Blockchain Might Be The Next Disruptive Technology

Bitcoin has been around for years. Its underlying technology — the blockchain — might be the most interesting and disruptive part of it.

2015-10-13

Apple Is Buying Into Artificial Intelligence

Apple has acquired a UK software startup that could give its digital assistant Siri a boost and has a growing portfolio of AI acquisitions.

2015-10-13

Who Will Step Up To Secure The Internet Of Things?

As everything in our Internet-enabled world becomes increasingly connected, everything is becoming accessible and potentially vulnerable.

2015-10-12

GCHQ Can Hack My Smartphone Using a Bunch of Smurfs

Dreamy, Nosey, Tracker and Paranoid - the unlikely team of GCHQ avatars that can power remote surveillance & control of mobile phones.

2015-10-08

Snowden : Smartphones Can Be Remotely Controlled

Smartphone users can do "very little" to stop security services getting "total control" over their devices, says Edward Snowden.

2015-10-07

DARPA - Tech to Protect the Internet of Things

The Pentagon's emerging technology agency wants to know what a device's thermal output shows about potential cyber-intrusions.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Get Cyber Safe

Get Cyber Safe

Get Cyber Safe is a national public awareness campaign created to educate Canadians about Internet security and the simple steps they can take to protect themselves online.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

Jamcracker

Jamcracker

Jamcracker is a cloud services management and cloud governance solutions company, with more than a decade of experience providing industry leading software and services.

Arete

Arete

Arete is a global cyber risk company whose mission is to transform the way organizations prepare for, respond to, and prevent cybercrime.

SEEK

SEEK

SEEK create world-class technology solutions to address the needs of job seekers and hirers across multiple sectors including cybersecurity.

RUSCADASEC

RUSCADASEC

RUSCADASEC is an independent non-profit initiative on developing the open Russian-speaking international community of industrial cyber security/ICS/SCADA cyber security professionals.

MSPAlliance

MSPAlliance

MSPAlliance is the world’s largest industry association and certification body for cloud computing and managed service professionals.

Securden

Securden

Securden provide an all-in-one Platform for Next-Gen Privileged Access Governance, helping you to prevent identity thefts, malware propagation, cyber attacks, and insider exploitation.

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.

oneclick

oneclick

oneclick is a central access and distribution platform in the cloud, enabling the management of the entire technology stack for application provisioning.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance is a global, non-profit industry association which is working to enable a secure connected future.

ControlMap

ControlMap

ControlMap is a software as a service platform with a mission to simplify and eliminate stress from everyday operations of modern IT compliance teams.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

Acumera

Acumera

Acumera is a leader in managed network security, visibility and automation services.

Commission Nationale de l'Informatique et des Libertés (CNIL)

Commission Nationale de l'Informatique et des Libertés (CNIL)

The mission of CNIL is to protect personal data, support innovation, and preserve individual liberties.