TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2016-03-14

Google's AI Machine To Battle 'Go' Champion

Master of the ancient Asian board game Go will sit down to defend humanity against Deep Mind.

2016-03-02

Facebook Uses AI To Map People's Homes

Facebook has used its AI tools to identify human-made structures in 20 different countries to find where to deploy internet-beaming drones.

2016-02-24

AI Could Leave Half Of The World Unemployed

AI’s economic threat should not be understated. Machines could put half the world’s population out of a job in the next 30 years.

2016-02-19

NSA AI Technology May Have Targeted Innocents

The NSA has been using a machine-learning program to identify & target terrorists with deadly force, but its methodology may have been wrong.

2016-01-11

Investing In Artificial Intelligence

Artificial intelligence is one of the most exciting and transformative opportunities of our time. Here's why investors are piling in.

2015-11-25

Google's New AI System is 'Machine Learning' Breakthrough

Google say it's TensorFlow system is theserious implementation of a framework for 'deep learning' allowing machines to learn abstract concepts.

2015-11-25

Is AI a Threat to Media Jobs?

DeepMind want to 'solve intelligence'. It's about the science of making machines smart.

2015-11-19

Artificial Intelligence Could Drive Human Inequality

A new report suggests that the marriage of AI and robotics could replace so many jobs that the era of mass employment could come to an end.

2015-10-13

Apple Is Buying Into Artificial Intelligence

Apple has acquired a UK software startup that could give its digital assistant Siri a boost and has a growing portfolio of AI acquisitions.

2015-10-06

AI - Reshaping the Workplace

AI-powered business applications will automate jobs, rather than just a task and the the effects will ripple across organizations.

2015-09-14

Autonomous Submarine Drones: A Threatening New Weapons Platform

Smart naval robots could make for very choppy waters in places where the U.S, Russia and others have competing interests.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Anomali

Anomali

Anomali delivers intelligence-driven cybersecurity solutions to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation.

Gate 15

Gate 15

Gate 15 provide risk management services focusing primarily on information, intelligence and threat analysis, operational support and preparedness.

Data61

Data61

Data61 is Australia’s leading digital research network offering the research capabilities, IP and collaboration programs to unleash the country’s digital & data-driven potential.

Ellipsis Technologies

Ellipsis Technologies

Ellipsis Technologies is a diversified technology company that develops innovative security software for websites and online applications.

Cansure

Cansure

Cansure is a leading insurance provider in Canada offering a broad range of property & casualty insurance solutions including Cyber & Data Breach insurance.

Quantifind

Quantifind

Quantifind enables financial crimes/fraud analysts and investigators to make better decisions, faster, with intelligent automation.

Secure Ideas

Secure Ideas

Secure Ideas is focused on penetration testing and application security including web applications, web services and mobile applications.

Barikat Cyber Security

Barikat Cyber Security

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training.

Cyber Range Solutions (CRS)

Cyber Range Solutions (CRS)

CRS provides cyber security training and improve security team performance by providing a hyper realistic, virtual training environment.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

Artifice Security

Artifice Security

Artifice Security will demonstrate real-world attacks on your network, web applications, infrastructure, and personnel to expose your hidden security risks.

Devolutions

Devolutions

Devolutions make best-in-class Privileged Access Management, Password Management, and Remote Connection Management solutions available to ALL organizations — including SMBs.

Backblaze

Backblaze

The Backblaze Storage Cloud provides a foundation for businesses, developers, IT professionals, and individuals to build applications, host content, manage media, back up and archive data, and more.

ThreatView by Turaco Labs

ThreatView by Turaco Labs

ThreatView combines extensive experience in digital forensics with advanced analytics and threat detection capabilities to protect eCommerce websites.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.