TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2023-08-04

Generative AI Tools Help Criminals Launch More Sophisticated Attacks

WormGPT: Even attackers with limited skills can use this technology, making it an accessible tool for a broader spectrum of cyber criminals.

2023-07-14

Hollywood Stars Strike Over AI Human Replacements

Virtual Body Double: Writers and actors are concerned about generative Artificial Intelligence tools replacing their roles in film & TV.

2023-07-25

Managing The Effects Of AI-Driven Cyber Attacks

Criminals are scaling how they compromise systems & execute attacks. Organisations need agile, comprehensive, unified security solutions.

2023-07-26

British Employees Lack The Training To Use AI Tools

Research from Salesforce shows that skills shortages at organisations across the UK pose serious challenges for the uptake of AI tools. 

2023-07-10

Can AI Help Reduce The Cybersecurity Workforce Gap?

Cybersecurity Operations: Automation is now regarded as a primary workforce strategy that 80% of organisations intend to pursue. By Jamal Elmellas

2023-07-10

Malvertising Proliferates As Half Of Online Ads Are Now AI Generated 

With malware-as-a-service and AI generated text & images easily accessible, even attackers with little or no skills can create convincing ads.

2023-07-04

The Nuclear Governance Model Won’t Work For AI

AI is increasingly discussed as an existential threat on the same scale as nuclear weapons. This parallel distorts the conversation about regulation.

2023-06-26

Don't Use ChatGPT At Work

Endangering The Organisation: There are numerous potential hazards for staff & employers connected with using ChatGPT in the workplace.

2023-06-19

Is It Possible To Trust AI Decision-Making In Cybersecurity?

AI's Use In Cybersecurity Is Still Evolving: How will this impact decision-making and can the results of its use be trusted? By Iam Waqas

2023-06-19

Five Biggest Dangers Of AI For The Upcoming Years

While talking about the potential applications and benefits of artificial intelligence, it’s also important to address the dark side of the moon. 

2023-06-13

How To Leverage AI For Real-Time User Verification

Businesses can now leverage AI algorithms to improve their user verification procedures & provide real-time security safeguards. By Ben Hartwig

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Paessler

Paessler

Paessler is a leading worldwide provider of network monitoring software.

Cobwebs Technologies

Cobwebs Technologies

Cobwebs Technologies provide web intelligence solutions for Law Enforcement (including cybercrime), Intelligence Agencies and Federal Agencies.

Siepel

Siepel

Siepel manufactures high quality shielded rooms and anechoic chambers dedicated to TEMPEST, NEMP & HIRF.

Cybertrust Japan

Cybertrust Japan

Cybertrust Japan provides a comprehensive security certification and digital authentication service, enabling customers to build and manage highly secure IT infrastructures.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

Tenfold Software

Tenfold Software

Tenfold is the unique, centralized platform for managing user and permissions efficiently and automatically.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

OcuCloud

OcuCloud

OcuCloud protects businesses' valuable information in the cloud, preventing security breaches caused by employees and remote vendors.

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

Secureframe

Secureframe

Companies from startups to enterprises use Secureframe to automate SOC 2 and ISO 27001 compliance, complete audits, and continuously monitor their security.

Squad

Squad

Squad provides leading expertise to ensure protection against the most complex cyber threats. Combining the best practices of DevOps and Cybersecurity, we are committed to create a secured cyber space

Interactive

Interactive

Interactive are a leading Australian IT service provider with services in Cloud, Cyber Security, Data Centres, Business Continuity, Hardware Maintenance, Digital Workplace, and Networks.

SecureClaw

SecureClaw

SecureClaw offers specialized cybersecurity consultation, various products, and a range of services to meet your company's business domain needs.

Cyscomply

Cyscomply

Cyscomply is an AI-powered self-assessment platform to identify gaps, benchmark against global standards and take the right action. You can assess against NIST CSF, DORA, ISO 27001, NIST 800-171.