TECHNOLOGY > > Developments


« Back to News

2015-07-21

CyberSecurity Future: Humans & Machines Work Symbiotically

Outnumbered: Because of the IoT there will be over 40 billion connected devices in use within five years.

2015-07-15

Elon Musk Aims to Save the World from Evil AI

Elon Musk to fund $10m Future of Life Institute research projects dedicated to keeping AI "beneficial".

2015-07-15

The Third Industrial Revolution

A third industrial revolution is under way & like all revolutions, this one will be disruptive.

2015-07-15

Unlocking the Potential of the Internet of Things

McKinsey think that the IoT has a total potential economic impact of $3.9 trillion to $11.1 trillion a year by 2025.

2015-07-15

FBI - Encryption is Great as Long as it Still Lets Us In

Too-tough-to-crack encryption poses a threat to national security.

2015-07-06

Google’s Robot Intelligence Help Desk

Google's system learns to model language & conversation based on examples in public documentation.

2015-07-06

Online Anonymity Box Distances Your IP Address

In the game of anonymity-versus-surveillance online, the discovery of the user’s IP address usually means game over.

2015-06-29

4 News Apps that Will Change Everything

These apps combine the eclectic harvesting of the best content from thousands of news sources with the curating power & skills of human editors.

2015-06-06

Gartner Predicts Three Big Trends for Business Intelligence

Gartner has identified three trends describing information’s ability to transform business processes over the next few years.

2015-06-01

Will Open Source Save the Internet of Things?

Cloud apps that collect and analyze data are heavily dependent on open source software & standards.

2015-05-26

US Defense Signals Silicon Valley's Cyberwar Help

The US government has a rapidly growing dependence on Silicon Valley,

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Rockwell Automation

Rockwell Automation

Rockwell Automation offer industrial security solutions to protect the integrity and availability of your complex automation solutions.

Devo Technology

Devo Technology

Devo Security Operations is a next-gen cloud SIEM that enables you to gain complete visibility, reduce noise, and focus on the threats that matter most to the business.

AppViewX

AppViewX

AppViewX is a global leader in the management, automation and orchestration of network services in data centers.

Fornetix

Fornetix

Fornetix is a cybersecurity platform enabling Zero Trust while delivering critical encryption automation, access controls, authorization services, machine identity, and ICAM solutions,

Serverless Computing

Serverless Computing

Serverless Computing London will help architects, developers and CIOs decide on the best path to a more efficient, scalable and secure computing future.

NinjaJobs

NinjaJobs

NinjaJobs is a community-run job platform developed by information security professionals. We focusing strictly on cybersecurity positions.

AppGuard

AppGuard

AppGuard prevents breaches by blocking applications from performing inappropriate processes using our patented dynamic isolation and inheritance technologies.

Fingent

Fingent

Fingent develops strategic software solutions for businesses across the globe in areas including Network Security, Infrastructure Security, Application Security, Risk and Compliance.

DataCloak

DataCloak

DataCloak is an innovation company that focus on providing enterprise data-in-motion security solutions based on zero-trust security technology.

iSecurity Consulting

iSecurity Consulting

iSecurity delivers a complete lifecycle of digital protection services across the globe for public and private sector clients.

Melius Cyber Security

Melius Cyber Security

Melius Cyber Security has developed a world-leading SaaS platform, Cyber Safe Plus, built around continuous assessment and improvement through vulnerability scanning and penetration testing

Presidio Identity

Presidio Identity

Presidio Identity offers a digital-native approach that brings security, privacy, and simplicity to user authentication and digital interactions.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

Epic Machines

Epic Machines

Epic Machines is a Value Added Reseller and Managed Security Services provider offering Security Transformation using Cloud-native solutions to commercial and government markets.

nodeQ

nodeQ

At nodeQ, we are pioneering the future of computer networks, leveraging our deep expertise in quantum communication, artificial intelligence, and software-defined networking.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.