TECHNOLOGY > > Developments


« Back to News

2025-06-04

Major Cybersecurity Risks In 2025 & How VPNs Help Defend Against Them

VPNs are essential if you want to stay private & secure online. When used correctly with other practices a VPN can make a huge difference.

2025-06-05

British Research & Innovation Faces Serious Cyber Attacks

Sharp Increase In Cyber Attacks On UKRI: The UK's primary science funding agency is under growing threat from sophisticated cyber espionage.

2025-05-15

Evolving The CISO Role

Navigating Modern Cyber Threats: The CISO's ability to influence and lead will be pivotal in shaping a resilient & secure future. By Joe Hubback

2025-04-17

The Geostrategic Battle Over Semiconductor Chips Just Got Bigger

President Trump is trying to create a domestic US semiconductor industry through protectionism and the US technology sector is getting worried.

2025-04-14

Securing The Cloud: The Role Of DevOps Programmers & Azure Engineers In Modern Cybersecurity

Automation Scales Decisions. People Guide Them: Combining DevOps with Azure cloud security is appealing to enterprise and mid-sized orgs.

2025-04-11

Do You Need Security That Starts With “Prove It”?

Deciding Between A Software-Defined Perimeter And A VPN: Both aim to secure remote access, by quite different routes. By Don Boxley

2025-04-01

Q-Day Could Lead To Hacking Nuclear Weapons

How soon will progress in quantum computing cross a threshold which will allow hacking of all existing online platforms, including nuclear weapons?

2025-03-19

Exploring The Growing Popularity Of Data Security Posture Management

Decoding DSPM: A security model that protects data directly, instead of securing the environment in which data is housed, moved or processed.

2025-03-18

Amazon Launches A Quantum Semiconductor Chip

Cat Qubits: Named Ocelot, the chip aims to deal with one of the major problems for quantum computer development - to make them error free.

2025-03-17

What Apple's Standoff With The UK Government Means For Your Data

Privacy On The Line: Creating a lawful mechanism for backdoor access means creating risks for everyone else. By Paul Holland

2025-02-21

AI Cracks A Long Term Scientific Mystery

Superbug Antibiotic Resistance: A Google AI tool has solved a scientific problem which has puzzled microbiologists for a decade in just 48 hours.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

Code42

Code42

Code42 CrashPlan, is an enterprise SaaS solution that backs up all distributed end-user data on a single, secure platform.

TestingXperts

TestingXperts

TestingXperts is a specialist software QA and testing company.

Bit4id

Bit4id

Bit4id provides technologies for electronic signature, online authentication, cybersecurity and all other services based on the concept of digital identity.

Armadillo Sec

Armadillo Sec

Armadillo provide penetration testing and vulnerability assessment services.

Cyber Covered

Cyber Covered

Cyber Covered provide complete website & data cover with market leading cyber insurance and powerful compliance software in one affordable package.

IoT M2M Council (IMC)

IoT M2M Council (IMC)

The IMC is the largest and fastest-growing trade organisation in the IoT/M2M sector.

Cyber Science

Cyber Science

Cyber Science is the flagship conference of C-MRiC, focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.

Voxility

Voxility

Voxility provides Infrastructure-as-a-Service in the biggest Internet hubs in the world.

ShardSecure

ShardSecure

ShardSecure Microshard technology eliminates data sensitivity, providing security, privacy and compliance beyond encryption.

Aryaka

Aryaka

Aryaka’s SmartServices offer connectivity, application acceleration, security, cloud networking and insights leveraging global orchestration and provisioning.

Getronics

Getronics

Getronics guides customers through their own transformation journeys, leveraging an integrated and secure-by-design IT portfolio.

PRE Security

PRE Security

PRE Security is leading the transition into the next era of AI cybersecurity with a new model: Predict & Prevent.

Resonance Security

Resonance Security

Resonance offers powerful cybersecurity aggregation software that makes protecting against full spectrum cybersecurity threats effortless no matter what your technical level, budget, or scope.

DataPatrol

DataPatrol

DataPatrol is a software company, specialized in providing Security and Privacy of company’s data and information in an evolved way.

Octane

Octane

Octane is an AI cybersecurity startup using machine learning to identify and fix vulnerabilities in blockchain codebases.