TECHNOLOGY > > Developments


« Back to News

2015-09-25

What Does Facebook Want With AI?

Study into artificial intelligence research is no longer the preserve of universities.

2015-09-15

A New Design for Cryptography’s Black Box

Advances in cryptography show how near-perfect computer security might be close at hand.

2015-09-14

Autonomous Submarine Drones: A Threatening New Weapons Platform

Smart naval robots could make for very choppy waters in places where the U.S, Russia and others have competing interests.

2015-09-14

Are We Really Safe From Self-Aware Robots?

Hey, Siri. Suddenly, those apocalyptic predictions about killer robots seem less crazy.

2015-09-11

IoT Will Change Your Relationship With Insurance

You + IoT + Provider = A New Dialogue

2015-09-09

Humans Should Ban Artificially Intelligent Weapons

Manufacturers & governments developing lethal AI weapons claim proper safeguards can be engineered. We doubt it.

2015-09-07

NSA Gives $300,000 for a Safer Internet of Things

The NSA is funding development for architecture for a "safer" Internet of Things (IoT) to 'design in' better security.

2015-08-31

Biometric Security: From A Selfie To the Way You Walk

The mobile, cloud, banking & payments industries must prepare for the shift from traditional authentication to new biometric systems.

2015-08-27

A Drone That Hacks Computers

Aerial Assault: A quadcopter flying hacker that scans the world below for insecure devices and vulnerable WiFi ports.

2015-08-27

Hackers to Military: Replace Us with Robots –Don’t Think So!

Next year’s DARPA Cyber Grand Challenge event will pit humans against machines in a grand hacking war.

2015-08-24

Defusing The Internet Of Things Time Bomb

The IoT offerings present a unique challenge because of the balance between functionality and connectivity.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

RoboForm

RoboForm

RoboForm's industry-leading encryption technology securely stores your passwords, with one Master Password serving as your encryption key.

Cyber Data-Risk Managers

Cyber Data-Risk Managers

Cyber Data-Risk Managers Pty Ltd is an insurance broker based in Melbourne, Australia specializing in Cyber insurance / Data breach insurance.

Fortress Group

Fortress Group

Fortress is specialized in confidential and discrete recruitment solutions and temporary staffing in the field of security and risk management.

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

VietSunshine

VietSunshine

VietSunshine is a leading provider of network security infrastructure and solutions in Vietnam.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

Zercurity

Zercurity

Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats.

Network Utilities (NetUtils)

Network Utilities (NetUtils)

Network Utilities provide identity centric network and security solutions to organisations from Telecoms and ISPs to SMEs and large corporates.

Bloc Ventures

Bloc Ventures

Bloc Ventures is an investment company providing long-term, ‘patient’ equity capital to early stage unquoted deep technology companies.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

Avalanchio Technologies

Avalanchio Technologies

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL or SQL.

nandin Innovation Centre

nandin Innovation Centre

nandin is ANSTO’s Innovation Centre (Australian Nuclear Science and Technology Organisation) where science and technology entrepreneurs, startups and graduates come together.

RySec

RySec

RySec specialize in affordable cybersecurity solutions designed to protect your business from today’s ever-evolving threats.