TECHNOLOGY > New


« Back to News

2019-09-25

5G Needs A New Generation Of Security

5G networks can deliver much more data much faster, dramatically raising the stakes for ensuring the security & reliability of mobile communications.

2019-09-27

AI Is Changing The Cyber Security Landscape

Artificial Intelligence can be used to detect and prevent attacks before they take place, but it can also be a double-edged sword.

2019-09-23

Will Robots Be Allowed To Kill?

The advent of autonomous weapons demands some form of agreed international legal restrictions on their use. By Alfred Rolington

2019-09-23

Business Migration To The Cloud

Making the decision to migrate to the cloud can be daunting. The tools are different and large-scale migration is not something to be taken lightly.

2019-09-20

The Technology Of Human Robotics

Mechanical people, nano-robots and the blurring of human identity are in prospect as the technology of robotics advances. By Alfred Rolington

2019-09-18

AI - Driven Warfare Using Robots

Faster, more high-tech and less human than ever before. A new wave of artificially intelligent weapons are making their way to the battlefield.

2019-09-19

Smart Technology In The Cyber-Age

We are on the edge of a new ‘cyber’ space age. This is how we make it a success. By Kristof Terryn

2019-09-16

Using Blockchain Helps Secure Data Against Attacks

Strength In Numbers: To corrupt a blockchain, every system that processes it would have to be attacked, which could be thousands of systems.

2019-09-16

10 Predictions For The IoT Future

It’s not just about computers, laptops, tablets, and smartphones anymore. Now a multitude of devices are Internet-connected. What next?

2019-09-13

A Virtual Geospatial Fence On Network Access

Protection of IT networks requires a multi-layered approach that incorporates user training and security technologies, including Geo-fencing.

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Cybsecurity Foundation (CSF)

Cybsecurity Foundation (CSF)

Cybsecurity is a non-profit NGO, which aims to work on improvement of security levels in the Polish cyberspace.

International Security Management Association (ISMA)

International Security Management Association (ISMA)

ISMA is an international security association of senior security executives from major business organizations located worldwide.

LAV Security

LAV Security

LAV Security specializes in vulnerability assessments, web application audits, outsourcing consultancy and various types of risk analysis.

BioCatch

BioCatch

BioCatch uses behavioral biometrics for fraud prevention and detection. Continuous authentication for web and mobile applications to prevent new account fraud.

FedRAMP

FedRAMP

FedRAMP, is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

CloudKnox Security

CloudKnox Security

CloudKnox Security is the only Cloud Security Platform built from the ground up for Identity Authorization Administration across hybrid cloud environments.

SK Infosec

SK Infosec

SK Infosec is a leading provider of information security consulting, managed security services, and enterprise security solutions in South Korea.

SpyCloud

SpyCloud

SpyCloud is a leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts either directly or through product integrations.

Mendoza Ventures

Mendoza Ventures

Mendoza Ventures is a venture capital fund focusing on pre-seed Artificial Intelligence (AI), Fintech, and Cybersecurity startups.