TECHNOLOGY > > Developments


« Back to News

2018-04-26

Artificial Intelligence Is Too Narrow

AI is based on sophisticated algorithms and the brute force of huge computing power. This makes it powerful, but its very specificity is a problem.

2018-04-25

Listening To Your Inner Voice

MIT researchers invent a wearable device that can read people’s internal voice, allowing them to control devices and ask queries without speaking.

2018-04-27

How AI & Machine Learning Can Revolutionise eCommerce

Its Not Just Amazon: As the right data and expertise fall into place, AI and machine learning will be game changers for eCommerce brands.

2018-04-25

The Apps That Map Violence

Residents of Rio de Janeiro are flocking to use crowdsourcing apps and following the social network pages of crime-watch groups for safety.

2018-04-23

The Cambridge Analytica Scandal 'highlights need for AI regulation'

British legislators are worried about the potential for misuse & monopolisation of data by big technology companies operating in the UK.

2018-04-20

Google Chairman Unaware Of Pentagon AI Project

Google is bidding for a multi-billion dollar Pentagon cloud contract. Which comes as news to the company Chairman, Eric Schmidt.

2018-04-19

How AI Will Define New Industries

AI expertise is more focused on commercial applications that optimise efficiencies in existing industries than on those that build new industries.

2018-04-24

Will AI Replace Most Jobs?

The persistent question about artificial intelligence, or “robots” in common parlance, is whether they will make human workers obsolete.

2018-04-30

AI And Blockchain In A Disruptive World

AI and blockchain enable a big threat from decentralisation but also create enormous opportunities for businesses to advantage from.

2018-04-27

IBM Watson AI Assistant Can Now Work With Autonomous Devices

IBM’s Watson is introducing Watson Assistant, designed to “help bridge the information and data sharing gap between people and things.”

2018-04-18

Human vs Machine Attack Response

Machine automation gives attackers the ability to quickly scale up attacks far beyond human capacity. But automation has its limits.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Lakeside Software

Lakeside Software

Lakeside Software is how organizations with large, complex IT environments can finally get visibility across their entire digital estates and see how to do more with less.

TZ-CERT

TZ-CERT

TZ-CERT is the National Computer Emergence Response Team of Tanzania.

Leviathan Security Group

Leviathan Security Group

Leviathan provides a broad set of information security services ranging from low-level technical engineering to strategic business consulting.

Living Security

Living Security

Living Security specializes in metric driven and engaging security awareness solutions that reduce risk by increasing security culture and changing employee behaviour.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

Riot Security

Riot Security

In today's world, most successful cyberattacks start by a human failure. Riot have developed a platform that makes it easy to prepare your employees for cyberattacks, in a way they love.

Cyrex

Cyrex

Cyrex is a Web3 security and development company. Our mastery over decentralized applications, smart contracts and blockchain will keep you secure across Web3.

coc00n

coc00n

coc00n secures the devices of high-value and high-interest individuals against cyber attacks.

Liberty Technology

Liberty Technology

Liberty Technology has a host of highly trained, certified experts who assist our clients with immediate remote support as well as on-site service.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.

Everfox

Everfox

Everfox (formerly Forcepoint Federal) has been defending the world's most critical data and networks against the most complex cyber threats imaginable for more than 25 years.

CelcomDigi

CelcomDigi

CelcomDigi aspire to be Malaysia’s top Telco-Tech company, transforming beyond core connectivity to lead digitalization and innovation as part of nation-building.

Hopper Security

Hopper Security

The Future of Open-Source Risk Management Starts Here. We built Hopper to make sure you can harness the power of Open-Source safely and effectively.