TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2017-12-05

Cybersecurity Firms Deploy AI Against Hackers

AI can detect threats at an early stage before too much damage has been done and there is no need for humans to defend networks from many attacks.

2017-11-21

When Guns And AI Work Together

As with smart lamps, TV and smart cars, AI technology is making guns a lot more intelligent.

2017-11-09

Garry Kasparov On AI & Cybersecurity

Garry Kasparov is one of the most brilliant, people to experience what many believe will soon happen to us all: being outsmarted by a machine.

2017-11-17

Artificial Intelligence Needs Regulation

As AI becomes widely available it is driving forward a wide range of industrial applications, but there are some big concerns over cybersecurity.

2017-11-07

AI Applied To Video Analytics

An AI technology that is the world’s first to show an awareness of its environment and of the actions occurring within it has been developed.

2017-11-27

Artificial Intelligence, Robotics & All Tomorrows Wars

An Experts Group on robotics and AI have sent a warning letter to the UN Convention on Certain Conventional Weapons. Is anyone listening?

2017-11-13

AI Can Guess Your Password

A new application of artificial intelligence & deep learning in information security focuses on more efficiently guessing passwords. It seems to work.

2017-10-05

When AI Takes Our jobs, Only Developers Stand A Chance Of Work

AI, robots, and other automation could put most of humanity on the dole as the jobs evaporate.

2017-10-16

Machine Learning is Transforming Data

While machine learning might seem a newly emerging trend, which it most certainly is, it is also a breakthrough that has been a long time coming.

2017-10-13

Wanted: A New Microchip For The AI Era

The coming AI revolution faces a big hurdle: today’s microchips as conventional chip design reaches its limits.

2017-10-11

Preventing The Hacked AI Apocalypse

As attacks are an increasingly worrisome threat to the performance of artificial intelligence applications, can AI be trusted?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

HackCon Norway

HackCon Norway

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas.

Introspective Networks

Introspective Networks

Introspective Networks (IN) is a Cybersecurity company focusing on securing data in the network and automating knowledge work to decrease vulnerability points to critical infrastructure.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

Tata Consultancy Services

Tata Consultancy Services

Tata Consultancy Services is a global leader in IT services, consulting & business solutions including cyber security.

Axonius

Axonius

Axonius is the only solution that offers a unified view of all assets and their coverage, empowering customers to take action to enforce their organization’s security policies.

ePlus

ePlus

ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk and empowering digital transformation.

Sayata Labs

Sayata Labs

Sayata delivers a streamlined solution for processing cyber policies. Increase profitability with an easy and intuitive platform.

Evina

Evina

Evina offers the most advanced cybersecurity and fraud protection for mobile payment.

Advantio

Advantio

Advantio offers a unique combination of technologies and managed, advisory and testing services to increase your cyber resilience and compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Triangle

Triangle

Triangle enable innovative business transformation by ensuring critical hybrid infrastructures are optimised, interoperable and secure.

Centum Digital

Centum Digital

Centum Digital provide services, products and solutions specialized in communications engineering, control and signal intelligence.