TECHNOLOGY > > Developments


« Back to News

2025-06-25

Closing The AI Divide - Mitigating Cyber Threats

AI-Powered Threats: A digital divide looms between those capable of defending against such threats, and those that can’t. By Dr. Megha Kumar

2025-06-23

The Future Of Digital Leadership Starts With The Website

Downgrading website strategy misses a critical opportunity to unite technology governance with business outcomes. By Doug Cunningham

2025-06-04

Major Cybersecurity Risks In 2025 & How VPNs Help Defend Against Them

VPNs are essential if you want to stay private & secure online. When used correctly with other practices a VPN can make a huge difference.

2025-06-05

British Research & Innovation Faces Serious Cyber Attacks

Sharp Increase In Cyber Attacks On UKRI: The UK's primary science funding agency is under growing threat from sophisticated cyber espionage.

2025-05-15

Evolving The CISO Role

Navigating Modern Cyber Threats: The CISO's ability to influence and lead will be pivotal in shaping a resilient & secure future. By Joe Hubback

2025-04-17

The Geostrategic Battle Over Semiconductor Chips Just Got Bigger

President Trump is trying to create a domestic US semiconductor industry through protectionism and the US technology sector is getting worried.

2025-04-14

Securing The Cloud: The Role Of DevOps Programmers & Azure Engineers In Modern Cybersecurity

Automation Scales Decisions. People Guide Them: Combining DevOps with Azure cloud security is appealing to enterprise and mid-sized orgs.

2025-04-11

Do You Need Security That Starts With “Prove It”?

Deciding Between A Software-Defined Perimeter And A VPN: Both aim to secure remote access, by quite different routes. By Don Boxley

2025-04-01

Q-Day Could Lead To Hacking Nuclear Weapons

How soon will progress in quantum computing cross a threshold which will allow hacking of all existing online platforms, including nuclear weapons?

2025-03-19

Exploring The Growing Popularity Of Data Security Posture Management

Decoding DSPM: A security model that protects data directly, instead of securing the environment in which data is housed, moved or processed.

2025-03-18

Amazon Launches A Quantum Semiconductor Chip

Cat Qubits: Named Ocelot, the chip aims to deal with one of the major problems for quantum computer development - to make them error free.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Protective Intelligence

Protective Intelligence

Protective Intelligence brings together a group of information security specialists with a passion for delivering high-quality solutions.

NSFOCUS Information Technology

NSFOCUS Information Technology

NSFOCUS is a global service provider and enterprise DDoS mitigation solution provider.

Veridify Security

Veridify Security

Veridify Security (formerly SecureRF), develops and licenses quantum-resistant, public-key security tools for the low-resource processors powering the Internet of Things.

Soracom

Soracom

Soracom offers secure, scalable, cloud-native connectivity developed specifically for the Internet of Things.

Thinklogical

Thinklogical

Thinklogical manufactures secure, KVM, video, audio, and computer peripheral signal switching solutions for defence C4ISR applications.

FTAPI Software

FTAPI Software

FTAPI SecuTransfer is a software solution for end-to-end encrypted data exchange of large and sensitive data with customers and partners.

AVORD

AVORD

AVORD is a cloud-based security testing platform that allows clients to manage security testing requirements in a far more productive and efficient way.

Cloudrise

Cloudrise

Cloudrise are elevating cloud security, data protection, and privacy through assessment, technology enablement, and process automation.

Rede Nacional CSIRT

Rede Nacional CSIRT

Rede Nacional CSIRT is a national network of CSIRTs in Portugal aimed at cooperation and mutual assistance in the handling of incidents and in the sharing of good security practices.

AgileBlue (Agile1)

AgileBlue (Agile1)

AgileBlue (formerly Agile1) is a managed breach detection company with an Autonomous SOC-as-a-Service for 24×7 monitoring, detection and guided response.

Telesystem

Telesystem

Telesystem empowers businesses across the USA with a range of innovative network, communication and collaboration solutions.

American Technology Services (ATS)

American Technology Services (ATS)

American Technology Services provides unparalleled services in information technology to support small and mid-sized business. From top-level strategy, to managed services and infrastructure support.

ZAG Technical Services

ZAG Technical Services

ZAG Technical Services is an award-winning information technology consulting firm delivering digital transformation solutions, IT assessments, managed services, security, and support.

Diverto

Diverto

Diverto is a company that provides a high level of information security to companies, institutions and other organisations in an information-centric world.

VCI Global

VCI Global

VCI Global is a diversified holding company. Through its subsidiaries, it focuses on consulting, fintech, AI, robotics, and cybersecurity.

Synergetika

Synergetika

Synergetika is a leading pure-play Privileged Access Management (PAM) consultancy and systems integrator.