TECHNOLOGY > > Developments


« Back to News

2024-04-19

Large Language Models Are An Inflection Point For Cyber Security

The LLM Step Change: A technology event comparable to the invention of the Internet, driving a $multi‐billion race to dominate this market.

2024-04-08

The Future of VPN Technology: Emerging Trends & Innovations

Trends & Innovations: VPNs are at the forefront of securing our online experiences, and it is incredibly important to prioritize online safety.

2024-04-04

Top 10 Emerging Cyber Security Threats By 2030

ENISA On Future Preparedness: As we move into the third decade of the 21st century, we must prepare for new & escalating cyber security threats.

2024-04-11

A New Era Of Accelerated Computing

Superchips: Powering a new era of computing, NVIDIA has announced the Blackwell GPU, which has several transformative features.

2024-04-01

Two Sides Of AI In The Industrial Internet of Things

Dual Perspectives: The synergy of AI and IoT will unlock a new level of creativity & efficiency, redefining industrial operations. By Antoinette Hodes

2024-04-02

Dark Data Helps Boost Business

Unveiling Hidden Insights: The untapped potential of dark data can have a transformative impact on business. By Jacques du Preez

2024-04-15

A Brief Introduction To Quantum Computing

Quantum Computing: Innovative technology is enabling individuals and companies to solve computational problems previously considered intractable.

2024-03-19

Insights From An Early Adopter Of Microsoft 365 Copilot

Navigating The Future: Microsoft 365 Copilot is not just another button to use within Word or Outlook; it’s an entirely new way of working. By Scott Dodds

2024-03-26

Humanoid Robot Startup Valued At $2.6 Billion

Major New Investors: Figure AI is a new startup firm which is working to build humanoid robots that can perform dangerous, undesirable jobs.

2024-03-25

Computers With Light-Speed Capabilities

Light-Based Processor: A new type of computer, using light rather than electricity, which could perform calculations faster, using less energy.

2024-04-11

First Generative AI Powered Conversational Search Assistant

Gaia: An AI-powered search assistant using Retrieval Augmented Generation & Large Language Models designed to transform data into knowledge.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

CYBERPOL

CYBERPOL

CYBERPOL's mission is to facilitate the widest possible mutual assistance between all cyber crime law enforcement authorities to help mitigate global cyber threats.

FAMOC

FAMOC

FAMOC is an enterprise mobile management solution that delivers comprehensive security and management for applications, documents, email, and mobile devices.

AEI Cybersecurity

AEI Cybersecurity

AEI brings together companies, Research Centres, Universities, and other organizations interested in promoting new cybersecurity technologies.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

Netwrix

Netwrix

Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach.

Netrix

Netrix

Netrix is a Mexican company specialized in IT Security, with more than 18 years of experience in Managed Services, Professional Services and Turnkey Solutions related to Security.

IoT Defense

IoT Defense

IoT Defense (IOTD) is a cybersecurity and networking company building solutions that enable the protection of networks and the ever-increasing prevalence of IoT devices.

Blueskytec (BST)

Blueskytec (BST)

BST provide accredited, patent-pending commercial cyber security hardware and software to protect your cyber physical systems from attack.

Internet Infrastructure Investigation

Internet Infrastructure Investigation

Internet Infrastructure Investigation offers a bespoke Internet Governance Solution to your brands online infringement problems.

RIA in a Box

RIA in a Box

MyRIACompliance combines our team of RIA compliance experts with an online software platform to help investment advisers better manage regulatory compliance and cybersecurity responsibilities.

Cybeta

Cybeta

Cybeta's actionable cybersecurity intelligence keeps your business safe with strategic and operational security recommendations that prevent breaches.

Boxphish

Boxphish

Boxphish provides a proven solution to reduce Human Error and Cyber Human Risk via automated learning journeys and intelligent phishing simulations.

Nonprofit Cyber

Nonprofit Cyber

Nonprofit Cyber is a first-of-its-kind coalition of global nonprofit organizations to enhance joint action to improve cybersecurity.

BrainStorm

BrainStorm

BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. It’s a cutting-edge platform to make your users more security savvy.

IONIX

IONIX

IONIX is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your real attack surface and its digital supply chain.