TECHNOLOGY > > Developments


« Back to News

2025-07-01

Using Cloud & Unified Communications To Enhance Collaboration & Productivity

CCaS: Unified cloud communications bring together multiple tools on a single platform, enabling seamless, real-time collaboration from anywhere.

2025-06-25

Closing The AI Divide - Mitigating Cyber Threats

AI-Powered Threats: A digital divide looms between those capable of defending against such threats, and those that can’t. By Dr. Megha Kumar

2025-06-23

The Future Of Digital Leadership Starts With The Website

Downgrading website strategy misses a critical opportunity to unite technology governance with business outcomes. By Doug Cunningham

2025-06-04

Major Cybersecurity Risks In 2025 & How VPNs Help Defend Against Them

VPNs are essential if you want to stay private & secure online. When used correctly with other practices a VPN can make a huge difference.

2025-06-05

British Research & Innovation Faces Serious Cyber Attacks

Sharp Increase In Cyber Attacks On UKRI: The UK's primary science funding agency is under growing threat from sophisticated cyber espionage.

2025-05-15

Evolving The CISO Role

Navigating Modern Cyber Threats: The CISO's ability to influence and lead will be pivotal in shaping a resilient & secure future. By Joe Hubback

2025-04-17

The Geostrategic Battle Over Semiconductor Chips Just Got Bigger

President Trump is trying to create a domestic US semiconductor industry through protectionism and the US technology sector is getting worried.

2025-04-14

Securing The Cloud: The Role Of DevOps Programmers & Azure Engineers In Modern Cybersecurity

Automation Scales Decisions. People Guide Them: Combining DevOps with Azure cloud security is appealing to enterprise and mid-sized orgs.

2025-04-11

Do You Need Security That Starts With “Prove It”?

Deciding Between A Software-Defined Perimeter And A VPN: Both aim to secure remote access, by quite different routes. By Don Boxley

2025-04-01

Q-Day Could Lead To Hacking Nuclear Weapons

How soon will progress in quantum computing cross a threshold which will allow hacking of all existing online platforms, including nuclear weapons?

2025-03-19

Exploring The Growing Popularity Of Data Security Posture Management

Decoding DSPM: A security model that protects data directly, instead of securing the environment in which data is housed, moved or processed.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

Infrascale

Infrascale

Infrascale specialise in providing cloud backup and disaster recovery services.

Cifas

Cifas

Cifas are leaders in fraud prevention, working closely with UK law enforcement partners.

CANVAS Consortium

CANVAS Consortium

The CANVAS Consortium aims to unify technology developers with legal and ethical scholar and social scientists to approach the challenges of cybersecurity.

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

RBCCPS is an interdisciplinary research and academic centre within the Indian Institute of Science focused on research in cyber-physical systems.

ShorePoint

ShorePoint

ShorePoint is an elite cybersecurity firm dedicated to improving the cyber resilience of Federal agencies and their missions.

Evolution Equity Partners

Evolution Equity Partners

Evolution Equity Partners is an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies.

Seadot Cybersecurity

Seadot Cybersecurity

Seadot offer cybersecurity services to organizations with a high demand for regulatory compliance and security.

Cyber Defense Networking Solutions (CDNS)

Cyber Defense Networking Solutions (CDNS)

CDNS is a global network infrastructure provider whose platforms are engineered for security, optimized for speed and designed for resiliency.

Fortiedge

Fortiedge

Fortiedge is an IT Security solution provider specializing in Cyber Security practices and solutions for our clients.

SeeMetrics

SeeMetrics

SeeMetrics is an automated cybersecurity performance management platform that integrates security data and business objectives into a simple interface.

Omega Systems

Omega Systems

Omega Systems is a leading managed service provider (MSP) and managed security service provider (MSSP) to mid-market organizations.

Elba

Elba

Employee security needs to be reinvented. SaaS security needs to involve end-user and awareness needs to be actionable. Meet elba, the 5-in-one cybersecurity hub with no compromises.

VPNBlade

VPNBlade

VPNBlade is your go-to resource for expert reviews and advice on VPN services.

LiveAction

LiveAction

LiveAction’s Network Intelligence platform transforms complex data into actionable insights, providing organizations with a comprehensive view of their network.