TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2025-03-05

DeepSeek - A Deep Dive Reveals More Than One Red Flag

DeepSeek has several vulnerabilities, exposing organisations to privacy breaches, regulatory violations & reputational damage. By Aditya K Sood

2025-02-27

Alibaba Intends To Spend $53bn On Developing AI

The leading Chinese technology business plans to spend more on its AI and cloud computing network than it has over the entire past decade.

2025-03-04

AI Could Help Prepare For The Next Pandemic

AI is already being used in medical and scientific research and has the potential to transform infectious disease epidemiology.  

2025-02-25

Grok 3 - The Latest AI Reasoning Model

Grok 3 has a powerful AI agent called Deep Search, plus a pre-trained model capable of matching the performance of OpenAI's Chat GPT-4.

2025-02-21

AI & Fake News

Inaccurate News Summaries: Four of the major Artificial Intelligence chatbots have been found producing flawed and erroneous news stories. 

2025-02-25

A New Threat To Biometric Security

New Threats To Biometric Security: Advanced forms of synthetic identity are a critical challenge for both businesses & government. By Paul Magee

2025-02-24

Iran Deploys AI - Guided Missiles & Drones

The use of AI in missile technology has the potential to shift military power balances in the M. East, as Iran advances its missile development.

2025-02-21

AI Cracks A Long Term Scientific Mystery

Superbug Antibiotic Resistance: A Google AI tool has solved a scientific problem which has puzzled microbiologists for a decade in just 48 hours.

2025-02-21

Fake News Threatens The German Election

Germany is bracing itself for cyber attacks and disinformation, particularly from Russia, in preparation for the Federal elections on 23rd February.

2025-02-19

DeepSeek: Revolutionary AI, Or The “Sputnik” Of Big Tech?

DeepSeek is a sea change in the race to lead the AI world. US companies are scrambling to stay innovative & effective in this ever-changing landscape.

2025-02-18

Ukraine Warns Of Growing Russian Use Of AI In Cyberwar Operations

Ukrainian cyber experts say Russia is using AI tools to analyse data stolen in cyber attacks, making its operations more precise & effective.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Continuity Shop

Continuity Shop

Continuity Shop provides training and consultancy in Business Continuity and Information Security to some of the world's biggest organisations.

National Cyber Security Centre (NKSC) - Lithuania

National Cyber Security Centre (NKSC) - Lithuania

NKSC is the main Lithuanian cyber security institution, responsible for unified management of cyber incidents, monitoring and control of the implementation of cyber security requirements.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The Media Trust

The Media Trust

The Media Trust continuously scans websites, ad tags and mobile apps and alerts on anomalies affecting websites and visitors.

Nouveau

Nouveau

Nouveau Solutions is a specialist IT managed services company with a strategic focus on delivering cloud, infrastructure, compliance, network and security solutions.

Modulo Security

Modulo Security

Modulo provides automated Governance, Risk, and Compliance (GRC) solutions.

Zecurion

Zecurion

Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest and in motion.

Infigo IS

Infigo IS

INFIGO IS specializes in information security consulting services. Our employees are leading information security experts in Croatia.

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

AlertFusion

AlertFusion

AlertFusion is a platform that makes security operations more effective. It complements existing tools and technologies, unifies operations, enhances process maturity and drives efficiencies.

Evolution Equity Partners

Evolution Equity Partners

Evolution Equity Partners is an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies.

Identity Management Institute (IMI)

Identity Management Institute (IMI)

Identity Management Institute (IMI) provides professional training and certification in cyber security with a focus on identity and access management, identity theft, and data protection.

NexGen Cyber

NexGen Cyber

NexGen Cyber helps customers in commercial SMB markets with IT security, security integration, service management, outsourced service transition, and transformative security solutions.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.

BluTinuity

BluTinuity

BluTinuity is a premier management consulting firm with a passion for information security, business continuity, incident response, disaster recovery, and HIPAA security.