TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2025-03-24

British Science Minister Uses ChatGPT For Policy Advice

The Minister responsible for Scince & Technology has defended his use of AI, saying that while he uses the tool, it does not replace expert advice.

2025-03-25

Combatting Rising AI Attacks With AI-Powered Defences 

User & Entity Behaviour Analytics: An effective approach to detect unknown threats by focusing on behavioural anomalies. By Kev Eley

2025-03-24

Britain Plans To Use  AI To Run Public Services

Making Artificial Intelligence Work For The People: The British government aims to harness AI technology and drive public sector efficiency.

2025-03-21

Artificial Intelligence - Real Risk

The Security Challenges Of Rapid AI Adoption: Unvetted AI opens the door to risks that can seriously disrupt business. By Ellen Benaim

2025-03-04

The Urgency Of AI Governance

Rapid Adoption Of AI-Driven Solutions: The lack of proper AI governance exposes businesses to financial, regulatory & reputational risks.

2025-03-05

DeepSeek - A Deep Dive Reveals More Than One Red Flag

DeepSeek has several vulnerabilities, exposing organisations to privacy breaches, regulatory violations & reputational damage. By Aditya K Sood

2025-02-27

Alibaba Intends To Spend $53bn On Developing AI

The leading Chinese technology business plans to spend more on its AI and cloud computing network than it has over the entire past decade.

2025-03-04

AI Could Help Prepare For The Next Pandemic

AI is already being used in medical and scientific research and has the potential to transform infectious disease epidemiology.  

2025-02-25

Grok 3 - The Latest AI Reasoning Model

Grok 3 has a powerful AI agent called Deep Search, plus a pre-trained model capable of matching the performance of OpenAI's Chat GPT-4.

2025-02-21

AI & Fake News

Inaccurate News Summaries: Four of the major Artificial Intelligence chatbots have been found producing flawed and erroneous news stories. 

2025-02-25

A New Threat To Biometric Security

New Threats To Biometric Security: Advanced forms of synthetic identity are a critical challenge for both businesses & government. By Paul Magee

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Tech Industry Forum (TIF)

Tech Industry Forum (TIF)

Tech Industry Forum is a not-for-profit, membership driven trade body. We bring together end users and some of the UK’s leading cloud, software, platform, infrastructure, and service providers.

Bromium

Bromium

Bromium deliver a new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

Maryville Online - Cybersecurity Program

Maryville Online - Cybersecurity Program

The Cybersecurity Program at Maryville Online is designed to help students reach opportunities in cybersecurity leadership and management through an entirely online curriculum.

Rafael

Rafael

Rafael has more than 15 years of proven experience in the cyber arena providing solutions for national security as well as commercial applications.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

Intrinium

Intrinium

Intrinium is an Information Technology and Security Solutions company, providing comprehensive consulting and managed services to businesses of all sizes.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

Bluefin Payment Systems

Bluefin Payment Systems

Bluefin is the recognized integrated payments leader in encryption and tokenization technologies that protect payments and sensitive data.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

QuantumCTek

QuantumCTek

QuantumCTek is a Chinese pioneer and leader in commercialized quantum information technology (QIT).

CommandK

CommandK

CommandK provides companies with infrastructure to protect their sensitive data. Built-in solutions to prevent data-leaks and simplify governance.

NPCERT

NPCERT

NPCERT is a team of Information Security experts formed to address the urgent need for the protection of national information and growing cybersecurity threat in Nepal.

Amyna Systems

Amyna Systems

Amyna has developed an IoT cybersecurity platform that prevents malignant attacks, helping users to protect themselves from cyberattacks.

SmartSea

SmartSea

SmartSea, a pioneering venture founded in collaboration with SITA, a global leader in aviation technology, is setting new standards in maritime digital transformation.