TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2024-06-25

AI & Cloud Are At The Intersection Of Cyber Security

Check Point’s 2024 Cloud Security Report: Cloud threats are growing with increasing concerns over emerging risks & zero-day attacks.

2024-06-25

The Psychology Of GenAI Manipulation

A Deep Dive Into Human Tactics: GenAI bots can be tricked into divulging sensitive information, placing organisations at risk. By John Blythe

2024-06-24

Leveraging The Benefits Of LLM Securely 

Holistic protection across the cloud native application lifecycle will enable business to embrace the full potential of GenAI. By Gilad Elyashar

2024-06-24

Facebook Phishing Emails Are Targeting Businesses

Be Aware: Fraudsters are increasingly inventive in finding ways to trick people into giving away their money & sensitive personal information. 

2024-06-19

Facts About Fake Election Advertising

Deepfakes Pose A Threat To 2024 Elections: Thousands of political ads on Facebook have been found to be in breach of Meta's own transparency rules.

2024-06-18

Taming Aggressive Algorithms

Child Protection: The British regulator has new rules to protect children online, part of a draft Children's Safety Codes of Practice. By David Varney

2024-06-10

The Major AI Threats Cyber Security Teams Must Deal With

The Big Five: Cyber threats are shaping the future, with a focus on the increasingly sophisticated use of AI by attackers as well as defenders.

2024-06-10

Business Is Responding To AI Cyber Security Threats

Firefighting: Cyber security teams are rapidly changing their strategies to keep pace with emerging AI-based threats targeting businesses.

2024-06-06

The Cybersecurity Risks Of Generative AI

GenAI security risks are revealing themselves as multi-faceted threats that stem from how different users interact with the tools. By Jaimen Hoopes

2024-06-04

Hamlet’s IP & AI

Washington Drama: As US regulators turn their attention to Artificial Intelligence, they face many complicated issues to untangle. By Ron Marks

2024-05-29

Google AI Makes Embarrassing Errors

Google has attracted derision after its proprietary AI tool, Overview, produced inaccurate, in some cases bizarre, answers to user questions.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Leviathan Security Group

Leviathan Security Group

Leviathan provides a broad set of information security services ranging from low-level technical engineering to strategic business consulting.

IMS Networks

IMS Networks

IMS Networks specializes in the design and management of high criticality networks and telecoms services including network security and Managed Security Services.

VTT Technical Research Centre of Finland

VTT Technical Research Centre of Finland

VTT is the leading research and technology company in the Nordic countries. Areas of activity include cyber security.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

Infosistem

Infosistem

Infosistem is a Croatian ICT company with extensive expertise and experience in enterprise and SMB ICT projects and solutions.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

Sweepatic

Sweepatic

The Sweepatic reconnaissance platform discovers and analyses all internet facing assets and their exposure to risk.

Africa ICS Cyber Security Conference

Africa ICS Cyber Security Conference

Africa's largest ICS Cyber Security Conference and Expo. The only platform that will proudly present top level B2B and B2C networking opportunities.

Netsurion

Netsurion

Netsurion powers secure and agile networks for highly distributed and small-to-medium enterprises and the IT providers that serve them.

Illuma Labs

Illuma Labs

Illuma Labs delivers real-time voice authentication and fraud prevention solutions.

ClearHub

ClearHub

The aim of ClearHub is simple: to give businesses like yours access to the best talent, all screened and technically tested by Clearvision’s expert team.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.

CyberSalus

CyberSalus

CyberSalus is a pioneering cyber tech services company dedicated to protecting the digital integrity of healthcare organizations.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.

Screwloose IT

Screwloose IT

Screwloose IT are a national provider of information technology services. We specialise in managed IT, cloud services, cyber security, website design and digital marketing for businesses of all sizes.