TECHNOLOGY > > Developments


« Back to News

2022-02-09

High-Tech Lie Detection Systems

Brain-scanning technologies & cheaper computing power offer powerful new lie-detection tools based on measuring cognitive changes.

2022-02-02

Winner: NSA Best Cyber Security Research Paper

The US spy agency runs an annual competition to find the best cyber security scientific research. This year's winner is all about cryptography.

2022-01-31

Artificial Intelligence Is Increasingly Important In Cyber Security 

Force Multiplier: AI offers major advantages for protecting people, systems & organisations from the relentlessly growing range of cyber threats.

2022-01-11

Super Intelligent Machines Need An Off Switch

They’re Already Here: An AI system with superior intelligence to humans could learn independently & have access to all the data of humanity.

2022-01-10

What To Expect From Data Science In 2022

What's Going On: Data science is being applied to multiple industries for different purposes across a broad range of business operations.

2021-12-14

Keeping Women Safe On British Streets

WalkSafe: Women feel less safe when walking alone after dark and now there is a real time SatNav tracking App available to give reassurance.

2021-12-07

A Short Guide To Building Cloud-Based SaaS Applications

Cloud based SaaS apps have many advantages: they are cost-effective, reliable, update automatically & have a high level of security. By Kate Harrison.

2021-10-22

Top Nine Technology Trends Of 2021

The technology industry is evolving fast and keeps improving every passing day. Here are some of the latest technology trends to be aware of.

2021-10-25

Blockchain Can Secure Autonomous Systems

Blockchain could be applied to ensure that teams of robots can perform their tasks, even when some of the individual robots are hacked.

2021-10-25

Google Creates Its Cyber Security Action Team

Team Mission: "supporting the security and digital transformation of governments, critical infrastructure, enterprises & small businesses".

2021-09-30

Incident Response In The AWS Cloud

All AWS users must have an appreciation of security incident response procedures and how to react to security issues. By Gilad David Mayaan

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

KPN

KPN

KPN is a leading supplier of ICT services including Cyber Security, Identity & Privacy, Secure Communications and Business Continuity.

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions delivers a range of Industrial Automation and Cyber solutions & services to sectors including Oil & Gas, Chemicals & Petrochemicals, Power and others.

Modulo Security

Modulo Security

Modulo provides automated Governance, Risk, and Compliance (GRC) solutions.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BlueFiles

BlueFiles

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

Cyber Command - Estonian Defence Forces

Cyber Command - Estonian Defence Forces

The main mission of the Cyber Command is to carry out operations in cyberspace in order to provide command support for Ministry of Defence’s area of responsibility.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

Digital Beachhead

Digital Beachhead

Digital Beachhead has the expertise to provide a range of Cyber Risk Management and other Professional Services with specifically tailored solutions at competitive prices.

Noblis

Noblis

Noblis is a dynamic science, technology, and strategy organization dedicated to creating forward-thinking technical and advisory solutions in the public interest.

Epiphany Systems

Epiphany Systems

Epiphany enhances your defensive security controls by providing you with an offensive perspective. We expose the most likely attack paths to your most critical IT assets and users.

Auvik Networks

Auvik Networks

Auvik is easy-to-use cloud-based networking management and monitoring software - true network visibility and control without the hassle.

Trovent Security

Trovent Security

Trovent was founded with a clear goal: to support medium-sized companies in significantly increasing their IT security level.