TECHNOLOGY > > Developments


« Back to News

2017-10-09

China Wants To Use AI To Predict Civil Disorder

China’s domestic intelligence chief tells police to use Artificial Intelligence to improve their ability to predict social unrest.

2017-10-03

AI Makes People In Your Business More Important

AI is already a part of consumer applications and is fast becoming a larger part of our work environment. But if you want subtlety, get a human.

2017-10-02

Robots Take Over The World’s Work

For so many jobs, machines are faster, more consistent, smarter, and cheaper than you or I will ever be. So why not tax them?

2017-09-29

AI Is Streamlining Marketing & Sales

Artificial Intelligence and autonomous algorithms are making and saving money every day for the businesses that deploy them.

2017-09-28

Spy Chiefs Set Sights On AI And Cyber

US intelligence directors are in agreement: the ability to harness data & artificial intelligence is a major priority for the intelligence community.

2017-09-25

AI Could Lead To World War

Tesla’s Elon Musk and Alphabet’s Mustafa Suleyman are calling for the ban on autonomous weapons.

2017-09-19

The IoT Will Bring Cyberwar Close To Home

Industrial & military control systems are considered the targets in cyberwarfare, but a consequence of IoT will be to bring the battle into our homes.

2017-09-14

New AI Claims To Determine If You Are Gay Or Straight.

Hard To Believe: Artificial Intelligence can accurately guess whether people are gay or straight, based on photos of their faces.

2017-09-11

Car Industry In Crisis Over AI and Hackers

Car security technology requires broad, sweeping changes in standards and the ways in-vehicle networks and devices are made to become secure.

2017-09-13

AI Attacks Are Just Around The Corner

Hackers will get help from robots and artificial intelligence and the first AI-enhanced cyber-attack could come in the next 12 months.

2017-09-12

IoT For Business & Creating 'Digital Twins'

If your organisation is planning to leverage the Internet of Things it needs to become familiar with the concept of the “digital twin.”

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TZ-CERT

TZ-CERT

TZ-CERT is the National Computer Emergence Response Team of Tanzania.

National Security Authority (NBU) - Slovakia

National Security Authority (NBU) - Slovakia

The National Security Authority (NBU) is the central government body in Slovakia for the Protection of Classified Information, Cryptographic Services, Trust Services and Cyber Security.

ES2

ES2

ES2 is a consulting organisation specialising in Enterprise Security and Solutions Services.

Flipside

Flipside

Information Security training provider specialized in personalized training and security awareness campaigns.

Vilnius Tech Park

Vilnius Tech Park

The region‘s most complex and integrated ICT hub, Vilnius Tech Park aims to attract and unite innovative talent from big data, cyber security, smart solutions, fintech and digital design.

Critical Start

Critical Start

Critical Start provides Managed Detection and Response services, endpoint security, threat intelligence, penetration testing, risk assessments, and incident response.

Portshift

Portshift

Portshift leverages the power of Kubernetes and Service-Mesh to deliver a single source of truth for containers and cloud-native applications security.

Siege Technologies

Siege Technologies

Siege Technologies is a pioneer of multi-purpose cybersecurity products and services that enable customers to leverage both offensive and defensive technologies.

LANCOM Systems

LANCOM Systems

LANCOM Systems is the leading European manufacturer of secure, reliable and future-proof networking (WAN, LAN, WLAN) and firewall solutions for the public and private sectors.

CYSIAM

CYSIAM

CYSIAM provides world-leading expertise in offensive security and critical incident response. We train our clients to be able to protect themselves and respond to attacks and breaches when they occur.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

ANSSI Burkina Faso

ANSSI Burkina Faso

ANSSI is responsible for managing the security of information systems and cyberspace in Burkina Faso.

Sprocket Security

Sprocket Security

Sprocket Security protects your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.

EK3 Technologies

EK3 Technologies

EK3 Technologies mission is to provide comprehensive cybersecurity and IT solutions that allow our clients to focus on sustaining their business.

Halo Security

Halo Security

Halo Security is a fast, easy, and scalable external attack surface management platform that gives security leaders deep visibility into their internet-facing assets.