TECHNOLOGY > > Developments


« Back to News

2015-07-06

Google’s Robot Intelligence Help Desk

Google's system learns to model language & conversation based on examples in public documentation.

2015-07-06

Online Anonymity Box Distances Your IP Address

In the game of anonymity-versus-surveillance online, the discovery of the user’s IP address usually means game over.

2015-06-29

4 News Apps that Will Change Everything

These apps combine the eclectic harvesting of the best content from thousands of news sources with the curating power & skills of human editors.

2015-06-06

Gartner Predicts Three Big Trends for Business Intelligence

Gartner has identified three trends describing information’s ability to transform business processes over the next few years.

2015-06-01

Will Open Source Save the Internet of Things?

Cloud apps that collect and analyze data are heavily dependent on open source software & standards.

2015-05-26

US Defense Signals Silicon Valley's Cyberwar Help

The US government has a rapidly growing dependence on Silicon Valley,

2015-05-26

Machine Learning for Cybersecurity

Traditional security systems are passive and a small code change by attackers can lead to even the most secure networks being breached.

2015-05-22

Device to protect your vehicle from “Sticky bombs”

’Advanced Car Protection’ will detect any hidden device placed under a parked car and will issue an alert in real time.

2015-05-20

China says Wearable Tech Could Leak Secrets

Wearable tech is now on the growing list of cyberwar battlefields, alongside email inboxes and USB drives.

2015-05-12

Will the Internet of Things Save us from Traffic Jams?

Experts have given the green light to a traffic light revolution.

2015-05-12

The US Air Force Wants You to Build a Drone Engine

“A successful 100-horsepower turbo shaft engine that operates on Jet A fuel and generate at least 2.0 horsepower per pound.”

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

Nexcom International

Nexcom International

Nexcom operates six global businesses - IoT Automation, Intelligent Digital Security, Internet of Things, Intelligent Platform & Services, Mobile Computing Solutions, Network & Communications.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

Lirex

Lirex

Lirex offer consulting and outsourcing services, complete design, construction and maintenance of ICT solutions and systems including cybersecurity.

APT Search

APT Search

APT Search is a recruitment company specialising within the Legal Technology, Cybersecurity and Privacy sectors.

Ashley Page

Ashley Page

Ashley Page offer a unique cyber insurance and risk management solution - Cyber+Insure.

IAR Systems

IAR Systems

IAR Systems are a frontrunner in a changing industry, and a future-proof software supplier enabling the IoT.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

BlackCloak

BlackCloak

BlackCloak provides Concierge Cyber Security for high-net-worth individuals and corporate executives to protect them from cybercrime, reputational risks, hacking and identity theft.

NetApp Excellerator

NetApp Excellerator

NetApp Excellerator is NetApp’s global start-up program that aims to fuel innovation by partnering with deep-tech start-ups.

Riskaware

Riskaware

CyberAware, by Riskaware, provides business-critical cyber attack analysis and impact assessments using NIST standards aligned with NCSC guidance.

Stairwell

Stairwell

Stairwell is building a new approach to cybersecurity around a vision that all security teams should be able to determine what’s good, what’s bad, and why.

Cyware

Cyware

Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally.

WinMagic

WinMagic

At WinMagic, we’re dedicated to making authentication and encryption solutions that protect data without causing user friction so that everyone can work freely and securely.

Sekur Private Data

Sekur Private Data

Sekur Private Data Ltd. is a Cybersecurity and Internet privacy provider of Swiss hosted solutions for secure communications and secure data management.

Eqlipse Technologies

Eqlipse Technologies

Eqlipse Technologies provides products and high-end engineering solutions to customers in the Department of Defense and Intelligence Community.

GISEC Global

GISEC Global

GISEC Global provides vendors and companies from around the world with access to lucrative opportunity to capitalize on what's set to become one of the world's booming markets.