TECHNOLOGY > > Developments


« Back to News

2024-04-30

Protecting OT With MDR

Managed Detection & Response: How to beat the rising tide of cyber attacks in Operational Technology driven environments. By Yannis Velitsikakis

2024-04-30

AWS & Google Agree To Drop Cloud Service Exit Fees

Data Portability & Cloud Interoperability: A multicloud strategy is becoming less expensive, optimising the flow of data. By Jamil Ahmed

2024-04-29

Facing The Quantum Challenge

The End Of Encryption: The potential of quantum computing is undeniable, but so is the threat it poses to our digital security. By Jason Soroko

2024-04-19

Large Language Models Are An Inflection Point For Cyber Security

The LLM Step Change: A technology event comparable to the invention of the Internet, driving a $multi‐billion race to dominate this market.

2024-04-08

The Future of VPN Technology: Emerging Trends & Innovations

Trends & Innovations: VPNs are at the forefront of securing our online experiences, and it is incredibly important to prioritize online safety.

2024-04-04

Top 10 Emerging Cyber Security Threats By 2030

ENISA On Future Preparedness: As we move into the third decade of the 21st century, we must prepare for new & escalating cyber security threats.

2024-04-11

A New Era Of Accelerated Computing

Superchips: Powering a new era of computing, NVIDIA has announced the Blackwell GPU, which has several transformative features.

2024-04-01

Two Sides Of AI In The Industrial Internet of Things

Dual Perspectives: The synergy of AI and IoT will unlock a new level of creativity & efficiency, redefining industrial operations. By Antoinette Hodes

2024-04-02

Dark Data Helps Boost Business

Unveiling Hidden Insights: The untapped potential of dark data can have a transformative impact on business. By Jacques du Preez

2024-04-15

A Brief Introduction To Quantum Computing

Quantum Computing: Innovative technology is enabling individuals and companies to solve computational problems previously considered intractable.

2024-03-19

Insights From An Early Adopter Of Microsoft 365 Copilot

Navigating The Future: Microsoft 365 Copilot is not just another button to use within Word or Outlook; it’s an entirely new way of working. By Scott Dodds

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ID-SIRTII/CC

ID-SIRTII/CC

Security Incident Response Team for Internet Infrastructure in Indonesia.

Apcon

Apcon

Apcon's mission is to provide valuable network insights that enable security and network professionals to monitor, secure and protect their data in both physical and virtual environments.

IntSights

IntSights

IntSights is an intelligence driven security provider offering rapid, accurate cyberthreat intelligence and incident mitigation in real time

The Data Privacy Group

The Data Privacy Group

The Data Privacy Group provide expert professional services underpinned by world leading automation tools and a consulting team specialized in privacy and data protection.

ThreatMark

ThreatMark

ThreatMark provides fraud detection solutions for digital banking and payments.

Versa Networks

Versa Networks

Versa is a software-defined networking vendor providing an end-to-end solution that both simplifies and secures the WAN/branch office network.

HoxHunt

HoxHunt

HoxHunt is an automated cyber training program that transforms the way your employees react and respond to the growing amount of phishing emails.

Cybersecurity Manufacturing Innovation Institute (CyManII)

Cybersecurity Manufacturing Innovation Institute (CyManII)

CyManII was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital supply chain and energy automation.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

Cyberstarts

Cyberstarts

Cyberstarts’ vision is to become the leading platform for amazing teams of entrepreneurs to solve the next big problems of the cybersecurity world.

Tracepoint

Tracepoint

Tracepoint provide full-service cyber incident response, remediation and recovery solutions for the most time-sensitive situation your company may ever face.

SIXGEN

SIXGEN

SIXGEN provides incident response, operational and penetration testing, red teaming, tool development, cyber training development and continuous monitoring.

BigBear.ai

BigBear.ai

BigBear.ai delivers high-end analytics capabilities across the data and digital spectrum to deliver information superiority and decision support.

Getronics

Getronics

Getronics guides customers through their own transformation journeys, leveraging an integrated and secure-by-design IT portfolio.

Confidencial

Confidencial

Confidencial is a provider of solutions that help organizations secure their most sensitive information, regardless if that information exists inside or is shared outside the organization.

BluTinuity

BluTinuity

BluTinuity is a premier management consulting firm with a passion for information security, business continuity, incident response, disaster recovery, and HIPAA security.