Cyber Security

HUB announcements and global media coverage

Healthcare and AI Security Use Case

Combining healthcare and AI: risks and solutions.

Digital Twins for Confidential Computing

Several types of digital twins and different levels of protection.

4IR: The Invisible Revolution – Part Four

Dangers of 4IR, securing 4IR and different approaches.

The Energy Efficiency of Confidential Computing

COP26 Glasgow, confidential computing and environmental concerns.

4IR: The Invisible Revolution – Part Two

Artificial Intelligence, machine learning, and the algorithms that underpin them.

4IR: The Invisible Revolution – Part One

The Fourth Industrial Revolution (4IR) is already here.