TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2018-08-09

Cyber AI In the Cloud: Securing New Computing Models, Applications & Devices

Darktrace: How AI technology is protecting cloud infrastructure from advanced cyber-threats, filling the security gap left by current approaches.

2018-08-30

AI Driven Security Is Much More Than An Algorithm

Good data boosts AI's ability to make judgments, and this starts with baseline data about users, devices, network systems and workflow patterns.

2018-08-29

Bank Industry Is Turning On To AI Technology

The rapid growth of AI is due to increasing market competition, the need to reduce overheads plus the benefits of capturing large volumes of data.

2018-08-10

Powering The Future Of Artificial Intelligence

AI’s rapid evolution is producing a very big expansion in various new types of hardware accelerators for machine learning.

2018-08-07

Business Will Benefit From Artificial Intelligence

AI will rapidly gain traction in these three critical areas of business: Decision Support, Equipment Maintenance and Customer Contact.

2018-07-31

Artificial Intelligence & Threat Detection

Two elite Canadian institutions are embarked on a cybersecurity research collaboration, focused on automated threat detection mechanisms.

2018-07-25

AI Will Thrash Employment

Some estimates suggest more than 400 million people worldwide could be looking for work by 2030.

2018-07-23

China Dominates Global Investment In AI

Chinese investment and financing in AI technology accounts for 60 percent of the worldwide total, valued in 2017 at $27 billion.

2018-07-18

The White House’s AI Committee's First Meeting

The high level group is charged with establishing partnerships between government, the private sector and independent researchers.

2018-07-17

Don't Leave AI Governance To The Machines

Now AI has the ability to reach its own conclusions, governance over the machines is critical for both business executives & customers.

2018-07-05

Using AI To Reduce Business Risks

The constant evolution of malware, ransomware and other threats makes detection with conventional cybersecurity protocols increasingly difficult.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Council of European Professional Informatics Societies (CEPIS)

Council of European Professional Informatics Societies (CEPIS)

CEPIS is the representative body of national informatics associations throughout Europe and represent over 450,000 ICT and informatics professionals in 32 countries.

Ciklum

Ciklum

Ciklum provide specialist software QA and testing services including Security QA and Performance QA, QA Automation and Manual QA.

Spanish National Cybersecurity Institute (INCIBE)

Spanish National Cybersecurity Institute (INCIBE)

INCIBE undertakes research, service delivery and coordination for building cybersecurity at the national and international levels.

SentryBay

SentryBay

SentryBay is a real-time data security company developing technology for PC, mobile, the cloud and IoT.

Excelsecu Data Technology

Excelsecu Data Technology

Excelsecu is a global solution provider of online identity authentication, widely applied in banks, government bodies and enterprises.

TeraByte

TeraByte

TeraByte is an information security company which helps to educate and protect businesses from cyber security related risks.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

Sequoia Capital

Sequoia Capital

Sequoia Capital is a venture capital firm focused mainly on technology. We partner both with young companies finding their stride and established ones looking for growth.

Ampliphae

Ampliphae

Ampliphae gives you an easy-to-deploy, sophisticated and affordable cloud-discovery, security and compliance platform.

Dcode

Dcode

Dcode connects the tech industry and government to drive commercial innovation in the federal market.

e360

e360

e360 (formerly Entisys360) is an award-winning IT consultancy specializing in advanced IT infrastructure, virtualization, security, automation and cloud first solutions.

Billington CyberSecurity

Billington CyberSecurity

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity.

Digital Security by Design (DSbD)

Digital Security by Design (DSbD)

Digital Security by Design is an initiative supported by the UK government to transform digital technology and create a more resilient, and secure foundation for a safer future.

Anchor Technologies Inc (ATI)

Anchor Technologies Inc (ATI)

Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.

Bleach Cyber

Bleach Cyber

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.