TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2015-09-09

Humans Should Ban Artificially Intelligent Weapons

Manufacturers & governments developing lethal AI weapons claim proper safeguards can be engineered. We doubt it.

2015-08-27

Hackers to Military: Replace Us with Robots –Don’t Think So!

Next year’s DARPA Cyber Grand Challenge event will pit humans against machines in a grand hacking war.

2015-08-14

Artificial Intelligence: Myths, Facts and Future

Should artificial intelligence be as smart as an average human?

2015-08-13

Artificial Intelligence Decodes ISIS

Artificial intelligence has been used to gain insights into the tactics of Islamic State.

2015-07-30

Scientists Want to Keep AI Out of Weapons

Both Stephen Hawking & Steve Wozniak signed an open letter that begged leaders to stop a military robotics arms race.

2015-07-31

AI is as Dangerous as Nuclear Weapons

Leading computer scientists fear humanity might be 'driving off a cliff' with the rapid development of Artificial Intelligence.

2015-05-26

Machine Learning for Cybersecurity

Traditional security systems are passive and a small code change by attackers can lead to even the most secure networks being breached.

2015-05-04

'Killer Robots' Offer Both Risks & Advantages for Military Use

Policy analysts in Canada are grappling with limits on the military use of robots.

2015-02-12

AI will not kill us, says Microsoft Research Chief

Microsoft Research's chief has said he thinks artificial intelligence systems could achieve consciousness, but has played down the threat to human life. Last December, Prof Stephen Hawking told the BBC that such machines could "spell the end of the human race".

2015-02-05

Application Of Unmanned Military Systems

The field of Unmanned Systems is rapidly developing, as part of other burgeoning sectors, such as artificial intelligence, robotics and cyber.

Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Endpoint Protector

Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

Kualitatem

Kualitatem

Kualitatem Inc. is an independent software testing and information systems auditing company

Auconet

Auconet

Auconet provide solutions for real-time monitoring, control, security, and management of complex IT infrastructures.

Emerson Electric Co

Emerson Electric Co

Emerson provides industrial automation systems and associated cybersecurity solutions to protect critical process control systems from cyber attack.

Cyberkov

Cyberkov

Cyberkov services include Pentesting, Vulnerability Assessments, Digital Forensics, Incident Response, Source Code Analysis and Security Training.

Remediant

Remediant

Remediant SecureONE is a cybersecurity tool that inventories and dynamically applies / removes privileged access to user and non-user accounts.

VigiTrust

VigiTrust

VigiTrust is a security firm specializing in cloud based eLearning programs, security compliance portals and providing security assessments.

Trustless Computing Association (TCA)

Trustless Computing Association (TCA)

TCA is is a non-profit organization promoting the creation and wide availability of IT and AI technologies that are radically more secure and accountable than today’s state of the art.

Accolite

Accolite

Accolite is an innovative, design thinking software company that guarantees seamless digital experiences with maximum results.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.