TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2024-10-08

AI Is Not a Substitute For Cyber Experts

AI is not a replacement for human expertise, but a powerful tool that complements and enhances the capabilities of cyber security professionals.

2024-10-08

There Are Ways You Can Detect A Deepfake

Discerning Truth From Fiction: The rapid adoption of AI to to generate fictitious images makes it important to be able to spot deepfake content.

2024-10-01

Meta To Use Facebook & Instagram Posts To Develop AI Tools

Illegal In The EU: Meta is given conditional permission to use anonymized posts from British Facebook & Instagram users to train AI models.

2024-09-22

EC-Council Unleashes AI-Powered Ethical Hackers On Cybercrime

EC-Council: CEH v13 certification equips cybersecurity professionals with essential AI skills & knowledge to prepare them for new era of cybercrime.

2024-09-26

AI-Powered Translation: A Bridge Between IT & Business

AI-powered translation can break down language barriers, particularly when it comes to translating complex technological jargon. By Paul Maksimovic 

2024-09-24

International Agreement To Regulate Artificial Intelligence

Britain Signs First International AI Treaty: The signatories commit to collective action to manage AI products & prevent its potential misuse.

2024-09-09

Criminally Exploiting AI Tools To Generate Illicit Revenue From Music Streaming

The accused claimed more than $10m in music royalty payments using AI tools and a network of bots, in a highly sophisticated long-term fraud.

2024-09-06

How AI Will Help Disrupt Elections Around The Globe

Generative AI is an attractive option for politically driven and nation state-sponsored threat actors. What can stop them? By Craig Watt

2024-09-04

Global AI Safety: Scientists Can Move The Needle

As differences in political values & priorities intensify cooperation on AI safety, scientist-led dialogue shows its worth. By Isabella Wilkinson

2024-09-01

AI & Biometrics In Cybersecurity

Securing the Digital Frontier: AI and Biometrics have a place in the cybersecurity measures needed to defend against cyber threats.

2024-08-30

China Aims to Compete With OpenAI, Gemini & Grok

Update: OpenAI’s decision to ban their products in China is accelerating the rise of Chinese AI companies, in fierce competition with US platforms.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Thales

Thales

Thales provides solutions, services and products that help its customers in the defence, aeronautics, space, transportation and digital identity and security markets to fulfil their critical missions.

CERTuy

CERTuy

CERTuy is the national Computer Emergency Response Team for Uruguay.

Crosscheck Networks

Crosscheck Networks

Crosscheck products allow you to test your APIs across different protocols and message formats with functional automation, performance, and security testing capabilities.

H-11 Digital Forensics

H-11 Digital Forensics

H-11 Digital Forensics is a global leader of digital forensic technology.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

Cytenna

Cytenna

Cytenna Signal is a suite of SaaS (Software-as-a-Service) products that use AI and machine learning to automatically aggregate the latest information about software vulnerabilities.

Atakama

Atakama

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture.

ECHO Project

ECHO Project

The main objective of ECHO is to strengthen the cyber defence of the European Union, enhancing Europe’s technological sovereignty through effective and efficient multi-sector collaboration.

Anonomatic

Anonomatic

Anonomatic’s mission is to make data privacy secure, simple and cost effective. We are Data and Privacy Experts who are passionate about helping organizations solve PII compliance.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

Nine23

Nine23

Nine23 are a highly focused cyber security solutions company that defines, builds and manages innovative services, enabling end-users to use technology securely in today’s workplace.

Infisign

Infisign

Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.

inSOC

inSOC

inSOC is an enterprise-grade AI-driven SOCaaS solution detecting breaches 24/7 with vulnerability management built-in. Designed for MSPs and MSSPs.

Redefine

Redefine

Redefine are Crypto-Native, Cyber Experts, and Blockchain Believers. We are here to make Web3 anti-fragile, safe and accessible to all.

TraitWare

TraitWare

The TraitWare mission is to increase user and company security while simplifying access to digital and physical resources through the elimination of the need for usernames and passwords.