TECHNOLOGY > > Developments


« Back to News

2020-08-19

Advanced AI For Cyber Operations

US defense research agencies want “autonomous software agents” capable of countering targeted network attacks & large-scale malware campaigns.

2020-08-10

Using Artificial Intelligence In Academic Research

The right AI powered tools and techniques can make a significant difference in how research is conducted and how fast results are obtained.

2020-08-06

The Risk Of AI Being Used For Offensive Purposes

Many corporate cyber security teams are reliant upon outdated attack scenarios which are no longer resistant to AI-powered attacks.

2020-07-29

Vital Necessity Of Cloud Computing Highlights Security Risks

Orca Security's research finds that public cloud environments are rife with neglected workloads, authentication issues and lateral movement risk.

2020-08-03

Use Machine Learning To Predict What Is Most Likely To Be Exploited.

Risk-based vulnerability management helps you prioritize your remediation efforts to focus on the assets that matter most. Download Free e-Book.

2020-07-14

Huawei 5G Ordered Out Of UK Networks

Mobile operators will have to remove all the Chinese technology company's 5G equipment from their UK networks by 2027.

2020-07-28

Machine Learning Transforms Threat Detection

Machine Learning can shift the advantage towards defenders by significantly improving cyber threat detection in real time.

2020-07-28

Problems With Using Big Data For Policing

Algorithmic law enforcement: Police across the world are starting to use Big Data to help them to predict crime and analyse criminal methods.

2020-07-20

Blockchain - A Simple Idea With Complications

The basic idea is simple. It decentralises the storage of data so it cannot be controlled and manipulated by just one central user. So what?

2020-07-17

Security Risks of Contactless Payment

Consumers are driving the push towards contactless payment, but like any technology, it comes with mobile security and data privacy risks.

2020-07-10

Cyber Security Technology To Protect Autonomous Vehicles

Collaboration between smart car manufacturers and cyber security experts is essential to establish standards in this emerging technology.

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Bishop Fox

Bishop Fox

Bishop Fox provides tailored security consulting services to companies across all industries. Our customers include many of the top organizations in the world.

Activereach

Activereach

Activereach provides a complete range of Internet, networking, voice & security solutions to businesses across the UK and Europe.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

Bugsec Group

Bugsec Group

BugSec is revolutionizing the field of cybersecurity by providing attack-oriented defensive strategies, delivered by the leading cyber experts.

Ilantus Technologies

Ilantus Technologies

Ilantus Technologies specializes in the Identity, Governance and Access domain with a unique focus in implementation and Managed Services.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

Cybera

Cybera

Cybera is a leading provider of secure, software-defined WAN to many of the world’s top enterprises.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

Intelligent Business Solutions Cyprus (IBSCY)

Intelligent Business Solutions Cyprus (IBSCY)

IBSCY Ltd is a leading provider of total IT solutions and services in Cyprus specializing in the areas of cloud services and applications, systems integration, IT infrastructure and security.

National Cybersecurity Preparedness Consortium (NCPC)

National Cybersecurity Preparedness Consortium (NCPC)

The mission of the NCPC is to provide research-based, cybersecurity-related training, exercises and technical assistance to local jurisdictions, counties, states and the private sector.

Cyberarch Consulting

Cyberarch Consulting

Cyberarch is a security-focused consulting firm. We provide services specializing in information security, digital forensics, penetration testing and cyber security training.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

Cutting Edge Technologies (CE Tech)

Cutting Edge Technologies (CE Tech)

CE Tech is a Next Generation Technology Partner providing advanced technology infrastructure solutions through partnerships with leading technology providers.

AlJammaz Technologies

AlJammaz Technologies

AlJammaz Technologies is the leading Technology Value-Added Distributor, which distributes advanced technology products, solutions and services in area including networking and cybersecurity.

Recon InfoSec

Recon InfoSec

The Recon InfoSec team includes analysts, architects, engineers, intrusion specialists, penetration testers, and operations experts.