TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2019-11-13

Artificial Intelligence & The Ethics Of War

Responsible, Equitable, Traceable, Reliable, Governable: The Pentagon has produced its first Ethical Code to govern the military use of AI.

2019-11-08

Machines With The Power To Kill

People have quit Google protesting the company's co-operation with the Pentagon on autonomous weapons, which they claim are dangerous.

2019-11-04

A £370m Investment To Boost AI In Britain

Big companies, universities and government have combined to invest in artificial intelligence, with a focus on researching applications in Healthcare.

2019-10-15

AI Security Tool Thinks Much Faster Than Humans

An innovative new cyber security tool has been launched by Darktrace, one that thinks like a human but works at the speed of a computer.

2019-09-27

AI Is Changing The Cyber Security Landscape

Artificial Intelligence can be used to detect and prevent attacks before they take place, but it can also be a double-edged sword.

2019-09-18

AI - Driven Warfare Using Robots

Faster, more high-tech and less human than ever before. A new wave of artificially intelligent weapons are making their way to the battlefield.

2019-09-12

AI Delivered Healthcare Creates Serious Legal & Ethical Issues

Use of Artificial Intelligence in medicine raises concerns over privacy, discrimination, psychological harm & doctor-patient relationships.

2019-08-12

Bank Creates Its Own AI To Identify & Disintegrate Malware

JPMorgan Chase is integrating Artificial Intelligence into its internal security systems to thwart malware infections within its own networks.

2019-07-26

Business Is Starting To Believe That AI Is The Best Defence

Two thirds of organisations acknowledge that they will not be able to respond to the next generation wave of critical threats without AI.

2019-07-22

AI Could Transform Submarine Warfare

Applying AI to ocean data helps submarine crews understand where their adversaries are, what they’re doing and what they can see.

2019-07-16

AI Solves Beatles Songwriting Dispute

Was it John Lennon or Paul McCartney? An algorithm has learned to read musical fingerprints to help resolve arguments over a song’s origins.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TBG Security

TBG Security

TBG provides a portfolio of services including cyber security, compliance and continuity solutions.

WhiteHat Security

WhiteHat Security

WhiteHat’s products enable customers to “Hack Yourself First” so that they gain a greater understanding of the actual risk to their business.

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

Trinexia

Trinexia

Trinexia (formerly Credence Security) is a specialty Value-added Distributor of Cyber Security, Digital Forensics, Security Awareness, Data Security & Governance solutions.

K2 Integrity

K2 Integrity

K2 Integrity is a preeminent risk, compliance, investigations, and monitoring firm - built by industry leaders to safeguard our clients’ operations, reputations, and economic security.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

WISeKey

WISeKey

WISeKey is a leading cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT.

Dathena

Dathena

Dathena is a company developing data governance software based on machine learning algorithms.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

VIBE Cybersecurity International

VIBE Cybersecurity International

VIBE’s certificate-less authenticated encryption enables scalable, flexible key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC).

Cyber Readiness Institute (CRI)

Cyber Readiness Institute (CRI)

At the Cyber Readiness Institute, our mission is simple: empower small and medium-sized enterprises with free tools and resources to help them become more secure and resilient.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

SequelNet

SequelNet

SequelNet is an emerging MSP, providing 360° business IT solutions and consulting services.

FearsOff

FearsOff

FearsOff is a global information security company serving clients worldwide. White hat operators with a black hat mindset to emulate real world attacks and everchanging threat vectors.

Two Candlesticks

Two Candlesticks

Two Candlesticks is a global cybersecurity service provider delivering high level consultancy, strategy, and frameworks to governments, regulators and midsized companies.