TECHNOLOGY > New


« Back to News

2020-05-06

The Impact Of Artificial Intelligence On Cyber Security

As digital innovation picks up speed, AI will become much more important in cyber security, but in the wrong hands could prove dangerous.

2020-05-05

Looking For Vulnerable IoT Devices

It takes a deep dive to discover the many unseen, unsecured & vulnerable devices spread across the Internet of Things. By David Balaban

2020-05-01

Quantum Computing Has Far Reaching Effects On Security

Quantum computers are capable of code-breaking applications that could pose major risks to the security of current communications systems.

2020-04-21

British Spies Looking For Private AI

MI5 is promising to work more closely with the private sector in harnessing artificial intelligence in tackling hostile state and terrorist activity.

2020-04-17

Quantum Computing, Hackers & The Internet of Things

Quantum computing is still in its development stage but its potential to enable interaction between humans and the IoT is uniquely powerful.

2020-04-16

Big Tech Benefits From COVID-19

The global coronavirus pandemic crisis provides a golden hour for big tech companies and they may emerge from the crisis even stronger.

2020-04-16

Pandemic Prevention Using Blockchain

Blockchain is increasingly being considered as a potentially powerful tool to assist with critical aspects of containing the coronavirus outbreak.

2020-04-15

Japan's New AI-Based Cyber Defence System

Japan's military plans an AI-powered defence system to respond fast to attacks on infrastructure in an automated way and to neutralise their effects.

2020-04-06

IoT - Pandemics, Opportunities And Massive Data Risks

The IoT transfers very large amounts of data without human interaction and this data is difficult to process using traditional management tools.

2020-04-02

Artificial Intelligence, Automation, Training & Jobs

The emergence of AI and Automation pose a new set of opportunities and challenges for the nature of work and for workers themselves.

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CDW

CDW

CDW delivers a comprehensive range of IT Solutions and Managed IT services to its customers, allowing them to focus on running their organisation, not managing their IT.

European Security Round Table (ESRT)

European Security Round Table (ESRT)

ESRT is a platform for the EU, NATO and other relevant actors to discuss European security and defence issues including cyber security.

Securonix

Securonix

Securonix provides Actionable Risk Intelligence by detecting high risk user activities and access in order to combat Insider Threat and Fraud.

Lakeside Software

Lakeside Software

Lakeside Software provides workspace analytics for desktop transformation, asset optimization, security, incident resolution, and continuous assessment.

Keyfactor

Keyfactor

Keyfactor is a leading provider of secure digital identity management solutions.

RiskIQ

RiskIQ

RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence.

FoilChat

FoilChat

FoilChat is a secure communication platform for corporate and private use for every device. Encrypted, secure and compliant.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.