TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2019-02-06

President Putin Wants A National AI Strategy

President Putin wants to build a national strategy for artificial intelligence as a critical tool for future economic and military power.

2019-02-05

AI Based Security Analytics Is Growing Fast

The AI-based security analytics and threat intelligence platform RANK Software more than doubled its business last year. What's next?

2019-02-04

AI In Business: 2019 Trends & Predictions

While robots will be taking over the workplace, some experts are predicting that it will actually improve and create new jobs for people.

2019-01-25

AI Tools Can Help Police Fight Crime

AI-based cognitive computing can organise evidence like unstructured audio and video data, transforming it into actionable intelligence.

2019-01-22

AI Will Find You In The Crowd

Neural network researchers say artificial intelligence can detect and identify individuals without facial recognition.

2018-12-27

The Fourth Industrial Revolution Built On Blockchain And AI

The need for Big Data analytics and the combination of AI and blockchain are key components of the Fourth Industrial Revolution.

2018-12-21

Robots And AI Will Create More Jobs Than They Replace

Robotics and AI will displace millions of jobs, but reduced costs and increased spending in some areas could generate a net gain in jobs.

2018-12-17

AI Will Solve Marketing Problems

When it comes to marketing, AI has implications in different dimensions that nudge customers towards the sale.

2018-12-11

US Marines Turn To Artificial Intelligence To Better Deploy Troops

The US Marine Corps is experimenting with AI to improve the way it deploys its forces and spot potential weaknesses years in advance.

2018-12-06

Artificial Intelligence Or Deep Learning? What's The Difference?

AI, machine learning, and deep learning often overlap and are easily confused. Here's a concise guide.

2018-12-05

AI Will Create Employment And Generate New Skills

AI and automation will open the door for scores of new job opportunities, many of which we can’t yet imagine.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

AtkinsRéalis

AtkinsRéalis

AtkinsRealis is a market-leading design, engineering and project management consultancy operating in fields ranging from infrastructure, through energy and transport to cybersecurity.

TrustedSec

TrustedSec

TrustedSec is an information security consulting services, providing tailored solutions and services for small, mid, and large businesses.

Immersive

Immersive

Immersive unifies Cyber Drills, Exercises, Sims, Ranges, and Training into one single, adaptive platform. One Platform. Total Cyber Resilience.

Evidence Talks (ETL)

Evidence Talks (ETL)

A leading forensic computing authority developing unique digital forensic technologies. Tools that detect potential terrorists & criminals & used by the military, enforcement & intelligence commmunity

Syskode Technologies

Syskode Technologies

Sykode Technologies is a next-generation global technology company offering an integrated portfolio of advisory services, products and solutions in areas including AI, IoT and Cyber Security.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

Open Systems

Open Systems

Open Systems is a Secure Access Service Edge (SASE) pioneer delivering a complete solution to network and security.

Aristi Technologies

Aristi Technologies

Aristi provides cybersecurity risk and compliance services to help manage your unique cyber risks, safeguarding your systems and data and complying with government and industry standards.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

Mosyle

Mosyle

Businesses and educational institutions rely on Mosyle to manage and secure their Apple devices and networks.

Pillar Technology Partners

Pillar Technology Partners

Pillar Technology Partners is an Information Security Company with a focus on improving Cyber Risk and optimizing the processes and technology that underpin the security of your information assets.

Professional Labs

Professional Labs

Professional Labs specialize in simplifying complex problems for our customers with Cloud Services, Managed Services and Cyber Security.

MIND

MIND

MIND is the first-ever data security platform that puts data loss prevention and insider risk management programs on autopilot, so you can automatically identify, detect and prevent data leaks.

Luxembourg House of Cybersecurity (LHC)

Luxembourg House of Cybersecurity (LHC)

Luxembourg House of Cybersecurity (formerly SecurityMadeIn.lu) is the backbone of leading-edge cyber resilience in Luxembourg.

Soteria Cybersecurity

Soteria Cybersecurity

Soteria is your trusted Cybersecurity Partner in IT and OT.

Dark Entry

Dark Entry

Dark Entry provide solutions to safeguard businesses, leveraging advanced technologies and intelligence-driven approaches to detect and mitigate risks associated with compromised data.