TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2020-08-03

Use Machine Learning To Predict What Is Most Likely To Be Exploited.

Risk-based vulnerability management helps you prioritize your remediation efforts to focus on the assets that matter most. Download Free e-Book.

2020-07-28

Machine Learning Transforms Threat Detection

Machine Learning can shift the advantage towards defenders by significantly improving cyber threat detection in real time.

2020-06-23

Using AI In Cyber Security

Advanced Artificial Intelligence and Machine Learning tools are becoming increasingly critical in detecting and combating cyber attacks.

2020-06-22

Is AI A Benefit Or A Potential Threat?

As Artificial Intelligence grows more sophisticated, concerns about the challenges its widespread use presents to humans are growing.

2020-06-09

Artificial Intelligence Takes Microsoft Jobs

Microsoft is firing 27 journalists to replace them with an AI, fueling the debate over whether the technology is a job creator or a destroyer.

2020-06-08

Britain Turns To AI To Counter Espionage

Cyber security threats require a speed of response far greater than humans are able to do and the spies at GCHQ want to use AI to do the job.

2020-05-29

The Influence Of AI On Cyber Security

AI and automation technologies are fast becoming vital to making a unified cyber security platform that organisations can rely on to repel attackers.

2020-05-12

Careers In Artificial Intelligence

AI is a job. With the growing adoption of AI technology across many industries there is a growing need for trained professionals.

2020-05-06

The Impact Of Artificial Intelligence On Cyber Security

As digital innovation picks up speed, AI will become much more important in cyber security, but in the wrong hands could prove dangerous.

2020-04-02

Artificial Intelligence, Automation, Training & Jobs

The emergence of AI and Automation pose a new set of opportunities and challenges for the nature of work and for workers themselves.

2020-04-06

AI, Machine Learning & Deep Learning… Whats The Difference?

There are several misconceptions related to these concepts but they are quite different from each other - Here are some short definitions.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Yokogawa Electric

Yokogawa Electric

Yokogawa is an electrical engineering company providing measurement, control, and information technologies including industrial cyber security.

Fox-IT

Fox-IT

Fox-IT prevents, solves and mitigates the most serious cyber threats with smart solutions for governmental bodies, defense, law enforcement, critical infrastructure, banking and large enterprises.

ICS2

ICS2

ICS² is the first cyber security company focusing on protecting the control system of power, oil, gas, and petrochemicals plants.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

TCN

TCN

TCN is an advanced System Integrator and Infrastructure Company in Albania.

LUCY Security

LUCY Security

LUCY is the answer when you want to increase your IT security, maintain your cyber security awareness, or test your IT defenses.

Clavis Information Security

Clavis Information Security

Clavis is an Information Security company offering a complete portfolio of solutions from Pentesting and Security Assessments to Managed Security Services and Training.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

CyberLab

CyberLab

CyberLab (formerly Chess) is a specialist cyber security company that provides a wide range of security solutions and services.

Kiberna

Kiberna

Kiberna are a small but niche company specialising in data driven security to manage your cyber risks.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

Kaesim Cybersecurity

Kaesim Cybersecurity

Kaesim are a global team of cybersecurity experts protecting businesses since 2015. We stop bad people damaging your business, your data and your reputation.

Knownsec

Knownsec

Knownsec provides customers with cloud defense, cloud monitoring, and cloud mapping products and services with "AI + security big data" as the underlying capability.

LOCH Technologies

LOCH Technologies

LOCH Wireless Machine Vision platform delivers next generation cybersecurity, performance monitoring, and cost management for all 5G and for broad-spectrum IoT, IoMT and OT wireless environments.

Inholo

Inholo

Inholo offers tools to manage the risks of synthetic realities, starting with an AI-photo detection service.

CompassMSP

CompassMSP

CompassMSP deliver Managed IT and cybersecurity solutions designed to unleash your business's full potential.