TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2025-05-09

The Seven Pillars Of MLops

Machine Learning Operations: AI and ML are not just about creating models, they’re about constructing integrated solutions. By Yuval Fernbach

2025-05-13

AI-Powered Malware - A Serious Cyber Security Threat

Malware Development: AI-powered cyber attacks are more sophisticated, harder to detect & capable of by-passing traditional security measures. 

2025-04-28

AI Uncovers A Cause Of Alzheimer’s Disease

Using AI, researchers at California University have revealed that there is a hidden DNA-binding function with a causal role in disrupting the brain.

2025-04-25

Traditional Cyber Insurance Isn’t Built For AI-Driven Attacks

Malicious Actors: As AI evolves, so does cybercrime - often outpacing the ability of businesses or insurers to respond effectively. By Randy Sadler 

2025-04-17

ChatGPT's Image Generation Could Be Driving Retail Fraud 

ChatGPT's sophisticated image generator could make the traditional verification process redundant. How can retailers fight back? By Doriel Abrahams

2025-04-09

Britain Falls Under Pressure To Relax Regulations On AI

The British government is warned to relax copyright laws and to allow Artificial Intelligence firms build new products in a less restricted way.

2025-04-07

The Security Risks Behind Shadow ML Adoption 

Defending AI: As AI models become more advanced and widely deployed, security concerns continue to mount. By Shachar Menashe

2025-04-01

Elon Musk Has Sold X To His xAI Company

Social Media & AI Intertwined: Combining data, models, distribution and talent - the combination creates greater power & influence for Musk.

2025-03-31

Half of Employees Use Shadow AI 

Non-Approved AI Tools: Personal AI tools are so valuable that half of workers would not give them up, even if their organization banned them.

2025-03-25

Manus - A Fully Autonomous Artificial Intelligence

Far-Reaching Implications: Manus operates autonomously, can multi-task seamlessly and complete jobs without instructions or human interaction.

2025-03-24

British Science Minister Uses ChatGPT For Policy Advice

The Minister responsible for Scince & Technology has defended his use of AI, saying that while he uses the tool, it does not replace expert advice.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

National Crime Agency (NCA) - United Kingdom

National Crime Agency (NCA) - United Kingdom

The NCA's Cyber Crime Unit focuses on critical cyber incidents in the UK as well as longer-term activity against the criminals and the services on which they depend.

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

SynerComm

SynerComm

SynerComm is an IT solution provider specializing in network and security infrastructure, enterprise mobility, remote access, wireless solutions, audit, pentesting and information assurance.

Six Degrees

Six Degrees

Six Degrees is a leading secure, integrated cloud services provider. We protect UK organisations and help them thrive in the cloud by giving them secure platforms to innovate and grow.

Cyberarch Consulting

Cyberarch Consulting

Cyberarch is a security-focused consulting firm. We provide services specializing in information security, digital forensics, penetration testing and cyber security training.

NanoLock Security

NanoLock Security

NanoLock delivers the industry’s only end-to-end platform for the IoT and connected devices ecosystem.

Ntirety

Ntirety

Ntirety Managed Security Services offer enterprise businesses the advanced tools, processes, and support to ensure your infrastructure, networks, and mission-critical applications are secure.

spiderSilk

spiderSilk

spiderSilk is a Dubai-based cybersecurity firm, specializing in simulating the most advanced cyber offenses on your technology so you can build your best security defenses.

Agile Underwriting

Agile Underwriting

Agile, an underwriting agency, insurtech and Coverholder at Lloyd's, provides niche insurance products across Aviation, Marine & Cargo, Cyber and Financial Lines.

Swiss It Security Group

Swiss It Security Group

Swiss It Security Group offers clients complete IT security concepts based on innovative solutions and technology, with a focus on protection, detection and defence.

Talion

Talion

Talion aim to reduce the complexity involved in securing your organisation and to give security teams unrivalled visibility into their security operations, so they can make optimal decisions, fast.

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

CMDC’s mission is to foster university-industry-government partnerships to assure that medical devices are safe and secure from cybersecurity threats.

Lumifi

Lumifi

Lumifi provide end-to-end cybersecurity resilience solutions with a specialty in managed detection and response (MDR) services.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

Leapfrog Services

Leapfrog Services

Leapfrog offers outsourced managed IT + cybersecurity services that are scalable, aligned, and fit easily into your business model.