TECHNOLOGY > > Developments


« Back to News

2017-10-13

Wanted: A New Microchip For The AI Era

The coming AI revolution faces a big hurdle: today’s microchips as conventional chip design reaches its limits.

2017-10-12

In Demand: New Tech Against Drone Attacks

Critical infrastructure and public security are highly exposed to the threat of drone attacks and this is a big concern for law enforcement worldwide.

2017-10-11

Preventing The Hacked AI Apocalypse

As attacks are an increasingly worrisome threat to the performance of artificial intelligence applications, can AI be trusted?

2017-10-09

China Wants To Use AI To Predict Civil Disorder

China’s domestic intelligence chief tells police to use Artificial Intelligence to improve their ability to predict social unrest.

2017-10-03

AI Makes People In Your Business More Important

AI is already a part of consumer applications and is fast becoming a larger part of our work environment. But if you want subtlety, get a human.

2017-10-02

Robots Take Over The World’s Work

For so many jobs, machines are faster, more consistent, smarter, and cheaper than you or I will ever be. So why not tax them?

2017-09-29

AI Is Streamlining Marketing & Sales

Artificial Intelligence and autonomous algorithms are making and saving money every day for the businesses that deploy them.

2017-09-28

Spy Chiefs Set Sights On AI And Cyber

US intelligence directors are in agreement: the ability to harness data & artificial intelligence is a major priority for the intelligence community.

2017-09-25

AI Could Lead To World War

Tesla’s Elon Musk and Alphabet’s Mustafa Suleyman are calling for the ban on autonomous weapons.

2017-09-19

The IoT Will Bring Cyberwar Close To Home

Industrial & military control systems are considered the targets in cyberwarfare, but a consequence of IoT will be to bring the battle into our homes.

2017-09-14

New AI Claims To Determine If You Are Gay Or Straight.

Hard To Believe: Artificial Intelligence can accurately guess whether people are gay or straight, based on photos of their faces.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

ThreatConnect

ThreatConnect

ThreatConnect is an enterprise threat intelligence platform by Cyber Squared bridging incident response, defense, and threat analysis for InfoSec & DFIR teams.

Qualys

Qualys

Qualys is a pioneer and leading provider of cloud security and compliance solutions.

F-Response

F-Response

F-Response is a software utility that enables an investigator to conduct live Forensics, Data Recovery, and eDiscovery over an IP network using their tools of choice.

S2 Grupo

S2 Grupo

S2 Grupo is the benchmark company in Europe and Latin America, for Cyber Intelligence and mission critical systems operations.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

Simility

Simility

Simility's multi-layered fraud detection solution uses superior machine learning & device intelligence technology to safeguard your online businesses.

Liberty Mutual

Liberty Mutual

Liberty Specialty Markets offers specialty and commercial insurance and reinsurance products, including Cyber, across the USA, Europe, Middle East and other international locations.

Cyber Polygon

Cyber Polygon

Cyber Polygon is an annual online exercise which connects various global organisations to train their competencies and exchange best practices.

Brace168

Brace168

Specialising in Cyber Security incident identification and response, Brace168 is uniquely positioned to provide a vast experience in managed security services to meet the needs of all business types.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

InfoSec Brigade

InfoSec Brigade

InfoSec Brigade offers a suite of specialized solutions that help businesses to mitigate risk by integrating cyber and IT security protocols with business goals.

Sayers

Sayers

Sayers is best known for its ability to solve business challenges with IT solutions. Our areas of expertise include cloud, storage, virtualization, security, mobility and networking.

Jot Digital

Jot Digital

Jot Digital is a full-service technology company specializing in digital engineering, application modernization and business transformation.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.

CardinalOps

CardinalOps

The CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack so you can easily implement a threat-informed defense.