TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2017-08-22

Artificial Intelligence: A Warning

Elon Musk repeats his warning about the dangers of AI, saying it poses “vastly more risk” than the apparent nuclear capabilities of North Korea does.

2017-08-17

Using AI In Business Intelligence

Enterprise is entering a new era ruled by data. AI in business intelligence is evolving into many aspects of everyday business.

2017-07-26

Key Concepts For Understanding Artificial Intelligence

AI has innovative uses across all industry segments, helping diagnose and solve problems faster and enabling consumers to do amazing things.

2017-07-25

The Impact Of AI On Employment Demands New Thinking

The challenge of protecting traditional jobs from the impact of globalisation will be further complicated by the effects of AI and automation.

2017-07-18

AI And Robotics Can Fight Cyber Crime

New techniques in AI, Machine Learning and Quantum Computing can massively improve the speed of cyber crime detection & prevention.

2017-07-13

AI For Effective Healthcare Cyber Resilience

Healthcare CISOs should recognise that AI has the ability to enhance the identification of malicious activity and to protect systems and data from attackers.

2017-06-27

Facebook Deploys AI To Block Terror Propaganda

Criticism from legislators, advertiser boycotts and lawsuits by terrorist outrage victims are pushing Facebook to find better ways to banish terrorist activity.

2017-06-22

AI Meets Music’s Evolution

You hum it, I'll strum it. Artificial Intelligence has the potential to transform the ways in which music is created, played and performed.

2017-06-21

Intel's Data Solutions For Military & Commercial Use

Intel has been selected by DARPA to develop a powerful new data analysis platform that will use machine learning and other AI techniques.

2017-06-22

Impact Of AI On UK Jobs Divides Opinion

BT say that IT decision makers are divided about the impact of disruptive technologies including AI and automation on the UK labour market.

2017-06-19

Machine Learning Writes Better Emails

Hierarchical Models Of Language: Google is introducing an enhanced version of its “smart reply” machine-learning email software.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IntaForensics

IntaForensics

IntaForensics offer a full range of digital investigation services and are able to adapt to the individual needs of solicitors, private clients, Law Enforcement Agencies and commercial businesses.

MetricStream

MetricStream

MetricStream provide integrated GRC solutions across business, IT, and security functions.

Tymlez Software & Consulting

Tymlez Software & Consulting

Tymlez Software and Consulting is a start-up specialised in blockchain technology for enterprises.

Cyberia Group

Cyberia Group

Cyberia is a leading Internet and Security services provider with operations in Saudi Arabia, Lebanon and Jordan.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

Ensconce Data Technology (EDT)

Ensconce Data Technology (EDT)

EDT’s focus is on providing solutions to properly sanitize Solid State Drives (SSD) and Magnetic Drives (HDD) before they are disposed or redeployed.

SIS Certifications (SIS CERT)

SIS Certifications (SIS CERT)

SIS Certifications is an ISO certification body serving more than 10,000 clients in over 15 countries worldwide.

Uptycs

Uptycs

Uptycs combines the open source universal agent, osquery, with a scalable security analytics platform for fleet visibility, intrusion detection, vulnerability monitoring and compliance.

Porto Research, Technology & Innovation Center (PORTIC)

Porto Research, Technology & Innovation Center (PORTIC)

PORTIC brings together several research centers and groups from P.PORTO in a single space, forming a superstructure dedicated to research, technology transfer, innovation and entrepreneurship.

PA Consulting

PA Consulting

PA Consulting Group is a consultancy that specialises in strategy, technology and innovation. Our cyber security experts work with you to spot digital and technology security risks and reduce them.

McDonald Hopkins

McDonald Hopkins

McDonald Hopkins is a business advisory and advocacy law firm. We focus on insightful legal solutions that help our clients strategically plan for an increasingly competitive future.

Orro Group

Orro Group

Orro create 'future now' solutions that make it faster, simpler and safer for you to access, store and share information. Wherever, whenever and with whomever you want.

Rhymetec

Rhymetec

Rhymetec are an industry leader in cloud security, providing innovative cybersecurity and data privacy services to the modern-day SaaS business.

Exodata

Exodata

Exodata is a French digital services company specializing in the outsourcing of IT Systems and solutions.

Staley Technologies

Staley Technologies

Staley Technologies is a US nationwide structured cabling, technology integrator, and Managed IT & Cyber Security provider.

CommScope

CommScope

CommScope is pushing the boundaries of technology to create the world’s most advanced wired and wireless networks.