TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2020-08-03

Use Machine Learning To Predict What Is Most Likely To Be Exploited.

Risk-based vulnerability management helps you prioritize your remediation efforts to focus on the assets that matter most. Download Free e-Book.

2020-07-28

Machine Learning Transforms Threat Detection

Machine Learning can shift the advantage towards defenders by significantly improving cyber threat detection in real time.

2020-06-23

Using AI In Cyber Security

Advanced Artificial Intelligence and Machine Learning tools are becoming increasingly critical in detecting and combating cyber attacks.

2020-06-22

Is AI A Benefit Or A Potential Threat?

As Artificial Intelligence grows more sophisticated, concerns about the challenges its widespread use presents to humans are growing.

2020-06-09

Artificial Intelligence Takes Microsoft Jobs

Microsoft is firing 27 journalists to replace them with an AI, fueling the debate over whether the technology is a job creator or a destroyer.

2020-06-08

Britain Turns To AI To Counter Espionage

Cyber security threats require a speed of response far greater than humans are able to do and the spies at GCHQ want to use AI to do the job.

2020-05-29

The Influence Of AI On Cyber Security

AI and automation technologies are fast becoming vital to making a unified cyber security platform that organisations can rely on to repel attackers.

2020-05-12

Careers In Artificial Intelligence

AI is a job. With the growing adoption of AI technology across many industries there is a growing need for trained professionals.

2020-05-06

The Impact Of Artificial Intelligence On Cyber Security

As digital innovation picks up speed, AI will become much more important in cyber security, but in the wrong hands could prove dangerous.

2020-04-02

Artificial Intelligence, Automation, Training & Jobs

The emergence of AI and Automation pose a new set of opportunities and challenges for the nature of work and for workers themselves.

2020-04-06

AI, Machine Learning & Deep Learning… Whats The Difference?

There are several misconceptions related to these concepts but they are quite different from each other - Here are some short definitions.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Linklaters LLP

Linklaters LLP

Linklaters is an international law firm. Practice areas include Information Management and Data Protection.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

Steptoe & Johnson

Steptoe & Johnson

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security.

Cysec - TU Darmstadt

Cysec - TU Darmstadt

CYSEC is the Cybersecurity faculty of the Technical University of Darmstadt and performs internationally renowned research in numerous areas of cybersecurity.

Ubisecure

Ubisecure

Ubisecure provide Identity & Access Management solutions.

UL

UL

UL is a safety, security and compliance consulting and certification company. Areas covered include cyber security.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

BitNinja

BitNinja

BitNinja provides full-stack server security in one easy-to-use protection suite. Enjoy real-time protection, automatic false positive handling and threat analysis for more in-depth insights.

Armenia Startup Academy

Armenia Startup Academy

Armenia Startup Academy is a pre-acceleration program for selected Armenian tech companies and startups in areas including cybersecurity.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

Ridge Security

Ridge Security

Ridge Security enables enterprise and web application teams, ISVs, governments, education, DevOps, anyone responsible for ensuring software security to affordably and efficiently test their systems.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

PureSoftware

PureSoftware

PureSoftware is a global software products and digital services company that is driving transformation for the world’s top organizations across various industry verticals.