TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2022-11-07

Artificial Intelligence & Its Impact On Cyber Security

Detecting the most dangerous attacks that can take down the network, versus intrusions which are problematic but won't take everything down.

2022-10-24

Cyber Security Solutions Driven By Artificial Intelligence Are In Demand

AI has emerged as a required technology to reinforce the efforts of human cyber security teams and the market will soon be worth $130 billion.

2022-10-19

Making Cyber Attack Detection Easier With Artificial Intelligence

New AI software tools enable collection of electricity usage data from network devices to detect fluctuations and swiftly identify and stop attacks.

2022-10-11

Russia Plans To Dominate Military AI

Automated Control Systems: Russia is making progress in its competition with the US military in building AI - directed command & control operations.

2022-09-22

Artificial Intelligence Distorts Government Decision-Making

AI reinforces the divisions of democracy and might also confound autocratic regimes, by concealing underlying social splits with false consensus.

2022-09-21

DARPA Wants To Play With Artificial Intelligence

Gamebreaker: DARPA wants to apply AI to existing real-time conflict strategy games to exploit every hidden and unfair advantage available.

2022-09-05

Improving The Safety & Stability Of Artificial Intelligence

An important initiative to understand the risks and identify the specific steps to improve AI safety and stability in national security applications.

2022-08-19

Artificial Intelligence Can Improve Cyber Security

Essential: Effective AI can save money and reduce the risk of breaches as organisations face an ever expanding number of vulnerable endpoints.

2022-08-12

Cambridge Is Britain's Most AI-Ready City

The renowned university city scored highest in an AI-readiness Index, closely followed by Oxford, then Manchester, Salford, Edinburgh, & Birmingham.

2022-07-18

Conversational Commerce Is Going To Be Big - But Could Be Risky

Cyber security threats are emerging as more people are using mobile messaging platforms to shop & contact customer services. By Dario Betti

2022-06-28

Edge AI: The Future of Artificial Intelligence And Edge Computing

Forward-thinking companies and cloud providers see new opportunities in the integration of edge computing and AI. By Helen Wilson

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

Join this webinar to learn how the cloud threat landscape is evolving and organizations are deploying more advanced and capable security controls at scale.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Micro Systemation AB (MSAB)

Micro Systemation AB (MSAB)

MSAB is a leader in the provision of forensically secure tools for the extraction and analysis of data from mobile devices.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

HvS Consulting

HvS Consulting

HvS Consulting is a specialist information security company offering a full range of services including IT security architecture, ISO 27001 audits, Pentesting, Security monitoring and Training.

infySEC

infySEC

InfySEC is an information security services organization offering Security Technology services, Security Consulting, Security Training, Research & Development.

PureCyber

PureCyber

PureCyber (previously Wolfberry Cyber) is an award-winning cyber security consultancy whose goal it is to make cyber security accessible, understandable, and affordable for any organisation.

WiJungle

WiJungle

WiJungle is an Indian Cyber Security Company that develops and markets a unified network security gateway solution.

Altaro Software

Altaro Software

Altaro provide backup solutions that are intuitive, easy to use, well-priced and backed by outstanding 24/7 support as part of the package.

Security Innovation Network (SINET)

Security Innovation Network (SINET)

SINET is dedicated to building a cohesive, worldwide Cybersecurity community with the goal of accelerating innovation through collaboration.

Asia Center of Excellence for Smart Technologies (ACES)

Asia Center of Excellence for Smart Technologies (ACES)

ACES is a one-stop competency center and incubator for the development of Industry 4.0 and associated technologies including cybersecurity, robotics, IoT and Big Data.

Cythereal

Cythereal

Cythereal is the leader in predicting and preventing advanced malware attacks. Security Automation for the Overwhelmed Administrator.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Tauruseer

Tauruseer

Tauruseer is the data-driven security posture management platform providing a complete life cycle approach for security in one place. 

Balance Theory

Balance Theory

Balance Theory provides the knowledge infrastructure and collaboration center for the cybersecurity community. A networked community to build better cybersecurity outcomes.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

Memcyco

Memcyco

Memcyco is a provider of cutting-edge digital trust technologies to empower brands in combating online brand impersonation fraud, and preventing fraud damages to businesses and their clients.