TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2018-11-14

Darktrace Describe The Alarming Future AI Attack Scenario

AI-driven malware that will self-propagate via a series of autonomous decisions, intelligently tailored to the parameters of the infected system.

2018-11-14

Can AI Be Used To Fight Crime?

AI is now sophisticated enough to offer police the tools to solve previous crimes while helping to prevent of crimes yet to take place. By Bill Hess

2018-11-06

AI Gives Businesses Real Customer Insights

Artificial Intelligence is capable of empowering companies to learn more about their customers and improve how they target specific audiences.

2018-11-07

Blockchain May Break Tech’s Hold On AI

Hot Money: The idea of applying the blockchain to artificial intelligence is attracting a growing number of serious entrepreneurs and VCs.

2018-11-01

Machine Learning & Big Data - Where You Least Expect It

Machine Learning has gone from a cryptic domain understood by a few to a technology that every company must deploy. Likewise Big Data.

2018-10-29

Amazon Scraps AI Recruiting Tool That Showed Bias Against Women

Amazon's machine-learning specialists have uncovered a big problem: their new recruiting engine did not like women.

2018-10-26

New Partnership To Combine Cyber AI And Forensics

Darktrace and Endace have announced a partnership that combines Darktrace's cyber AI with Endace's forensic capabilities.

2018-10-15

AI Hyperdrives Into Outer Space

Future deep space missions are likely to be turbo-charged by Artificial Intelligence on their voyage to comets, moons and the planets.

2018-10-17

Artificial Intelligence - What We Need To Know

The trouble with the term artificial intelligence is the word 'intelligence'. It should not be confused with human sentience.

2018-10-08

Cybersecurity Overtakes AI As Law Firms' Tech Priority

Fear of reputational damage due to hacking pushes cybersecurity to the top of the agenda for law firms.

2018-10-02

Machine Learning Algorithms & Police Decision-Making

Use of machine learning in police decision-making is in its infancy and the impact of algorithms on police officers’ actions is poorly understood.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

Q-CERT

Q-CERT

Q-CERT is the National Computer Security Emergency Team of Qatar.

Guardtime

Guardtime

Guardtime's Black Lantern platform provides real-time cybersecurity and data-centric asset protection.

Compass Security

Compass Security

Compass Security is a specialist IT Security consultancy firm based in Switzerland. Services include pentesting, security assessments, digital forensics and security training.

Intelligent Waves

Intelligent Waves

Intelligent Waves holds and manages contracts to provide an array of intelligence, operational, communications and IT support to the USG in austere, forward-deployed, hazardous duty environments.

Real Random

Real Random

Real Random is on a mission to enhance existing and new crypto-systems with its revolutionary solution to generating numbers that are Truly Random.

AKS IT Services

AKS IT Services

AKS IT Services (an ISO 9001:2015 and ISO 27001:2013 certified company) is a leading IT Security Services and Solutions provider.

MER Group

MER Group

MER Group is a world-leading integrator in the areas of communications and security. MER cyber solutions cover the entire range of cyber and intelligence related products and services.

CERT-PH

CERT-PH

CERT-PH is the National Computer Emergency Response Team and the highest body for cybersecurity related activities in the Philippines.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

M2MD Technologies

M2MD Technologies

M2MD Technologies offers solutions optimized for cellular IoT that provide stronger security, reduced costs, enhanced user experience, and ultimately generates higher returns for stakeholders.

ADGS

ADGS

ADGS is a deeptech company focused in the fields of Agent-Based simulations (Emergent Behavior), Cybersecurity and Biometrics, Social Dynamics, Natural Language Processing and Artificial Intelligence.

Brace168

Brace168

Specialising in Cyber Security incident identification and response, Brace168 is uniquely positioned to provide a vast experience in managed security services to meet the needs of all business types.

Robo Shadow

Robo Shadow

Robo Shadow are trying to bridge the gap between the top tier organisations that can afford everything and everyone else who has to “Make it up as they go along” when it comes to Cyber.

ITSEC Asia

ITSEC Asia

ITSEC Asia works to effectively reduce exposure to information security threats and improve the effectiveness of its clients' information security management systems.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.