TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2025-01-24

LinkedIn Accused Of Misusing Private Messages To Train AI Models

LinkedIn Premium users have filed a lawsuit accusing LinkedIn of sharing their private messages with other companies to train their AI models.

2025-01-23

Stargate - A Very Big Bet On AI Infrastructure

A $500billion investment in re-industrialising the USA, building a strategic capability to protect national security and competing with China.

2025-01-20

Balancing Progress & Protection In Britain's Public Services

Citizen Experience: Transforming public services is a delicate process - innovation needs to be balanced with data protection. By Kam Bhatoa

2025-01-13

The British Government’s AI Action Plan 

The new AI regime in Britain could facilitate a “sweet spot”, attracting the sort of investment and innovation intended to boost economic growth. 

2025-01-10

AI-Enhanced Attacks Are A Rising Threat

As AI is more widely adopted, companies are creating more vulnerabilities within their own organisations and attacks will become more sophisticated.

2025-01-10

Microsoft Will Spend $80b On AI-Enabled Data Centers

Microsoft has revealed plans to spend as much as $80 billion this year on the construction of data centers that can handle AI workloads.

2025-01-06

Israel Establishes A Unified Military AI Command

Artificial Intelligence has emerged as one of the most transformative digital technologies, and Israel is driving its use in military applications.

2025-01-03

Artificial Intelligence Presents Urgent Risks

Potentially Very Dangerous Technology: An eminent scientist is warning that AI could wipe out the human race within the next decade.

2024-12-31

What Are The Key Trends That Will Shape Tech In 2025?

Weaponised AI & Compliance: Executives at NinjaOne identify four key trends that will shape the technology industry in 2025 and beyond. 

2024-12-27

Using AI To Its Full Cybersecurity Potential

2024 Was The Year Of AI: We spoke to four industry experts to discover their predictions for 2025 when it comes to AI and its pros and cons. 

2024-12-17

Diversity Is Key To Combating Gen-AI Hackers

Hiring practices should prioritise candidates with diverse skills & non-traditional backgrounds, broadening the talent pool. By Andrea Cullen

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Arcitura Education

Arcitura Education

Arcitura is a leading global provider of progressive, vendor-neutral IT training and certification programs.

Seric Systems

Seric Systems

Seric is a technology business specialising in security, infrastructure and data management.

Nouveau

Nouveau

Nouveau Solutions is a specialist IT managed services company with a strategic focus on delivering cloud, infrastructure, compliance, network and security solutions.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

Ksmartech

Ksmartech

Ksmartech provide services related to security and authentication in all areas where the connection of people to objects, and objects and objects is necessary.

Port53 Technologies

Port53 Technologies

Port53 Technologies is focused on delivering enterprise-grade, cloud-delivered security solutions that are easy to deploy, simple to manage and extremely effective.

QNu Labs

QNu Labs

QNu Labs’s quantum-safe cryptography products and solutions assure unconditional security of critical data on the internet and cloud across all industry verticals, globally.

Privacyware

Privacyware

Privacyware's ThreatSentry combines a state-of-the-art Web Application Firewall and port-level firewall with advanced behavioral filtering to block unwanted IIS traffic and web application threats.

SOC Experts

SOC Experts

SOC Experts is a pioneer (we started SOC training well before people realized how big the domain was going to be) and the only institution to provide end-to-end training on Security Operations Centers

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

Entro Security

Entro Security

Entro is the first holistic secrets security platform that detects, safeguards, and enriches with context your secrets across code, vaults, chats, and platforms.

Mercury Systems

Mercury Systems

Mercury Systems is the leader in making trusted, secure mission-critical technologies profoundly more accessible to aerospace and defense.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.

Anagram

Anagram

Anagram is the world’s first human-driven security awareness training platform that delivers real results.

DRTConfidence

DRTConfidence

DRTConfidence is the proven solution for today’s organizations needing to meet rigorous compliance standards across the enterprise.