TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2021-09-06

An AI Can File A Patent Application

Legal Entity: A court in Australia has ruled that Artificial Intelligence systems can be legally recognised as an inventor in patent applications.

2021-08-10

AI Reveals Iran’s Nuclear Weapons Factory

Analysts used Artificial IntelIigence tools to analyse geospatial satellite data tracking construction traffic at the Natanz nuclear site in Iran.

2021-07-27

Data Privacy Is Key To The Technology Battle With China

The US wants to establish international privacy-protection standards to counter the proliferation of powerful new technologies dominated by China.

2021-07-26

Military Intelligence: British Army Operation Using AI

British armed forces will increasingly use AI to predict adversaries’ behaviour, reconnaissance and relay real-time intelligence from the battlefield.

2021-07-22

IBM Watson In Demand

IBM Watson's 'AI-for-Hire' service is poised to grow 30%, driven by Healthcare and Financial Services customers looking for real time data processing.

2021-07-20

Artificial Intelligence Is Being Badly Used In Cyber Security

With many more enterprises using AI technology, it’s time to analyse the possible negative impacts of AI's implementation in cyber security.

2021-07-05

Artificial Intelligence Can Reduce Cyber Attacks

AI is an effective solution to protect organisations from cyber attacks, but it can also be used by hackers to launch complex, automated attacks.

2021-06-29

China Is Gaining Technical Supremacy

British spy chiefs warn that leadership in key technologies affecting national security, including AI and Quantum Computing, is moving East.

2021-06-21

Drones Kill Without Human Control

Turkish built autonomous drones with an explosive charge are now reported working without human control as battlefield killers in Libya.

2021-06-15

AI Dominance On The Battlefield

AI is already part of our lives and as the technology matures it will play a key role in future wars, using sensory-intelligent remote weapons.

Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Security Compass

Security Compass

Security Compass is a software security company that provides professional services, training, and a first-of-its kind Software Security Requirements Management (SSRM) platform.

LogPoint

LogPoint

LogPoint offers a full enterprise SIEM (Security Information & Event Management) solution to defend against cybercrime and fraud.

ID-SIRTII/CC

ID-SIRTII/CC

Security Incident Response Team for Internet Infrastructure in Indonesia.

Guy Carpenter

Guy Carpenter

Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics.

Bluink

Bluink

Bluink specializes in identity and access management and customer identity verification, using your smartphone as a strong authenticator and secure identity store.

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Beosin

Beosin

Beosin is a blockchain security company providing cybersecurity services including security audits, on-chain asset investigation, threat intelligence and wallet security.

CyPhyCon

CyPhyCon

CyPhyCon is an annual event exploring threats and solutions to cyber attacks on cyber-physical systems such as industrial control systems, Internet of Things and Industrial Internet of Things.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

Ampion

Ampion

Ampion is a leading Australian provider of cyber security, DevOps and quality engineering services.