TECHNOLOGY > > Developments


« Back to News

2025-09-01

What Does CMMS Mean In Maintenance Management?

Computerized Maintenance Management System: No matter your size, if maintenance is part of your operations, a CMMS offers big value.

2025-08-28

Converging Physical & Cyber: Securing Cloud-Connected Cameras Across Multi-Site

Security Cameras Are Part Of Your Attack Surface: They should be run with the same discipline that you apply to laptops, SaaS & cloud workloads.

2025-08-25

The Modern Cyber Risks Lurking In Media Operations

Live & Vulnerable: Attackers are getting closer to the media industry's core by compromising its operational edges. By Tim Grieveson

2025-08-06

Predictive Maintenance In The Age Of AI & Cybersecurity Challenges

The integration of AI-driven predictive maintenance in industrial environments is advancing operational efficiency - it also introduces new risks.

2025-08-01

Cloud Security Posture Management Emerges As A Key Element In Cyber Security

Rise Of CPSM Is A Potential Game-Changer: Market set to grow at a CAGR of 10.6% to reach $14 Billion by 2034, as cloud adoption accelerates.

2025-07-28

Reimagining Network Infrastructure With Agentic AI

AI Agents In The Workplace: We are witnessing a fundamental shift in the way we use AI. It no longer just thinks – it can act. By Gary Sidhu

2025-07-24

AWS Cloud Security: Architectural Imperatives For Enterprise Protection

AWS Security Frameworks: The core components, operational significance, and strategic implementation for robust enterprise defense.

2025-08-12

Quantum Data Communications To Outsmart Hackers

Entangled Twins: Quantum communication dispenses with complex passwords or encryption algorithms and are impossible to unlock.

2025-07-22

Crypto’s ‘Trust’ Problem

Why We Need A Rethink On Risk: If the crypto sector is to achieve the mass adoption it aspires to, it needs a big culture change. By Neil Holloway

2025-07-01

Using Cloud & Unified Communications To Enhance Collaboration & Productivity

CCaS: Unified cloud communications bring together multiple tools on a single platform, enabling seamless, real-time collaboration from anywhere.

2025-06-25

Closing The AI Divide - Mitigating Cyber Threats

AI-Powered Threats: A digital divide looms between those capable of defending against such threats, and those that can’t. By Dr. Megha Kumar

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Luxar Tech

Luxar Tech

Luxar's network visibility products enable enterprises and service providers to monitor network traffic, improve security and optimize efficiency.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

CyberInsureOne

CyberInsureOne

At CyberInsureOne, we break down the complex world of cyber insurance, and connect you with providers that can give you and your company peace of mind.

UNIDIR Cyber Policy Portal

UNIDIR Cyber Policy Portal

The UNIDIR Cyber Policy Portal is an online reference tool that maps the cybersecurity and cybersecurity-related policy landscape.

Energia Ventures

Energia Ventures

Energia Ventures is a three-month intensive accelerator for entrepreneurs with an innovative business in the energy, smart grid, cleantech, and cybersecurity sectors.

Blaick Technologies

Blaick Technologies

Blaick is an Israeli cyber-security company which deploys proprietary Artificial Intelligence threats detection technology for early prevention of online cyber crime.

riskmethods

riskmethods

riskmethods helps you proactively identify, assess and mitigate supply chain risk. You need to master supply chain risk management—we can help.

GovernmentCIO

GovernmentCIO

GovernmentCIO was founded with a single purpose: to transform government IT. We are thought leaders in data analytics, machine learning, cybersecurity and IT transformation.

Cerby

Cerby

Your team uses unmanageable applications that put you, your company, and your data at risk. Protect, secure, and accelerate your business automatically with Cerby.

Scybers

Scybers

Scybers are a global cybersecurity advisory and managed services company. With our deep expertise, we help our clients reduce their cyber risks with confidence.

ProvenRun

ProvenRun

ProvenRun is a leading provider of trusted software solutions with extensive expertise and an unwavering commitment to security.

SureCloud Cyber Services

SureCloud Cyber Services

Our Cyber Testing capability has been honed since we were founded in 2006 as a disrupter in the penetration testing market.

Odaseva

Odaseva

Odaseva delivers the strongest data security solution for enterprises running on Salesforce, safeguarding confidentiality and integrity of critical business information.

National Renewable Energy Laboratory (NREL) - USA

National Renewable Energy Laboratory (NREL) - USA

NREL is transforming energy through research, development, commercialization, and deployment of renewable energy and energy efficiency technologies.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.