TECHNOLOGY > > Developments


« Back to News

2024-03-19

Insights From An Early Adopter Of Microsoft 365 Copilot

Navigating The Future: Microsoft 365 Copilot is not just another button to use within Word or Outlook; it’s an entirely new way of working. By Scott Dodds

2024-03-26

Humanoid Robot Startup Valued At $2.6 Billion

Major New Investors: Figure AI is a new startup firm which is working to build humanoid robots that can perform dangerous, undesirable jobs.

2024-03-25

Computers With Light-Speed Capabilities

Light-Based Processor: A new type of computer, using light rather than electricity, which could perform calculations faster, using less energy.

2024-02-26

AI Targeted Drones Are Not Working

Both Ukraine & Russia have deployed small military drones that use AI to identify and select potential targets, but with no measurable effect.

2024-02-20

Top Three Types of Data Security Technology

Encryption, Firewalls, Authentication & Access Control: The top three types of technology that strengthen security and protect against cyber threats.

2024-02-23

Humanoid Robotics: The Next Step For Artificial Intelligence

Embodied AI: Robotic technology is evolving at unprecedented speed, to the point where robots are able to learn by watching what humans do.

2024-02-07

Neuralink Implant A Brain Chip In A Human

A Brain - Computer Interface: Neuralink has implanted a wireless brain chip in a human for the first time aimed at restoring motor functionality.

2024-02-02

Fast Forward - Technology Developments By 2040

Expert futurists forecast how rapid technology changes may shape our world over the next 15 years. Both AI and misinformation will be significant.

2024-01-31

The Importance Of Cloud Access Security In Today's Cyber Landscape

Cloud Access Security Broker solutions provide organizations with the necessary tools and capabilities to secure their cloud environments.

2024-01-31

Quantum Computing: The Growing Threat Of SNDL

Store Now & Decrypt Later: Advances in Quantum computing mean that any encrypted data that's already been stolen can no longer be protected.

2024-01-29

Navigating Cloud-Native Application Security With CWPP

Cloud Workload Protection Platforms: A security solution that protects containerized environments & manages identities & access control effectively.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NQA Certification

NQA Certification

NQA provides certification to a range of ISO standards including ISO 27001 for information security management.

Falanx Cyber

Falanx Cyber

Falanx Cyber provides enterprise-class cyber security services and solutions. We deliver end-to-end cyber capabilities, either as specific engagements or as fully-managed services.

V-Key

V-Key

V-Key is a global leader in software based digital security, providing solutions for mobile identity, authentication, authorization, and mobile payments for major banks.

BooleBox

BooleBox

BooleBox is the cloud for business data security that allows to share sensitive files by reducing the risk of external attacks or insider theft.

Clari5

Clari5

Clari5 redefines real-time, cross channel banking Enterprise Fraud Management using a central nervous system approach to fight financial crime.

Fischer Identity

Fischer Identity

Fischer Identity provide identity & access management and identity governance administration solutions.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

Internet Infrastructure Investigation

Internet Infrastructure Investigation

Internet Infrastructure Investigation offers a bespoke Internet Governance Solution to your brands online infringement problems.

Aujus Cybersecurity

Aujus Cybersecurity

Aujas is a pure-play cyber security services company with deep expertise in Identity and Access Management, Managed Security and Security Testing services.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

JaCIRT

JaCIRT

JaCIRT is the national Cyber Incident Response Team for Jamaica, established to deliver on the mandate outlined in the GoJ’s National Cyber Security Strategy.

Topsec Cloud Solutions

Topsec Cloud Solutions

The Topsec Managed Email Security Platform eliminates Spam, Viruses, Malware, and Phishing.

Telindus

Telindus

Telindus is the strategic IT partner for the flexible organization of the future. We build optimal IT infrastructure with four components: networking, cloud, cybersecurity and data & AI.

NANO Corp

NANO Corp

At NANO Corp, we keep your network visible, understandable, operational and secure with state-of-the-art technology.

FTx Identity

FTx Identity

FTx Identity is the world's most advanced age verification technology (AVT) and identity management system.

Crypto Legal

Crypto Legal

Crypto Legal is a leading UK-based law firm specialising in blockchain forensics and legal services.