TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2024-03-18

AI-Driven Cyber Security Is Booming

AI Is Transforming Cyber Security: At the speed that it's being adopted, the market is expected to reach more than $133 billion by 2030.

2024-03-15

Microsoft Going Large On AI & Cloud Computing

Microsoft is making big investments in Europe, with multi-billion-dollar spending plans for the UK & Germany plus a new R&D centre in Spain.

2024-02-26

AI Targeted Drones Are Not Working

Both Ukraine & Russia have deployed small military drones that use AI to identify and select potential targets, but with no measurable effect.

2024-03-11

Deepfakes Complicate Election Security

Detection & Controlling Deepfakes: Leading US technology companies have agreed to combat the deceptive use of AI In the US Elections.

2024-02-20

Cyber Warfare & The Future Of AI

AI will be integral in the next phase of cyber warfare, enabling new tools and new versions of classic attacks, according to intelligence experts.

2024-02-27

Will Generative-AI Take Female Jobs?

Use of AI in the workplace is increasing fast and female workers are concerned that this technology could place them at a higher risk of redundancy.

2024-02-23

Humanoid Robotics: The Next Step For Artificial Intelligence

Embodied AI: Robotic technology is evolving at unprecedented speed, to the point where robots are able to learn by watching what humans do.

2024-02-16

British Police, AI & The Fight Against Cyber Crime 

The fraud and cybercrime landscape is going to be profoundly transformed by AI. A top British Police officer answers some key questions.

2024-02-13

The US Makes Robocalls Illegal

With major national elections pending in the major democracies around the world, the US FCC regulator has outlawed AI-generated phone calls.

2024-02-12

Imran Khan Claims Victory Using AI Generated Video

Pakistan Election Turmoil: The imprisoned political leader appeared on an AI generated video to claim virtual victory following an Internet shutdown.

2024-02-07

Healthcare Has Issues With Outsourced Cyber Security

Managed Service Providers Must Improve: Cyber security providers need to build trust and show that they “care” through closer collaboration.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

SCIPP International

SCIPP International

SCIPP’s courses are based on internationally recognized best business practices for security awareness, for both technical and non-technical staff and to comply with regulatory mandates.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

Trinity Cyber

Trinity Cyber

Trinity Cyber’s patent-pending technology stops attacks before they reach internal networks,reducing risk and increasing cost to adversaries.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Consulting Services to help you secure your mission-critical systems.

Heidrick & Struggles International

Heidrick & Struggles International

Heidrick & Struggles is a premier provider of leadership consulting and senior-level executive search services for roles including Information & Technology Officers and Cybersecurity.

Palantir

Palantir

Palantir software empowers entire organizations to answer complex questions quickly by bringing the right data to the people who need it.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

Etisalat and (e&)

Etisalat and (e&)

Etisalat Group is one of the world’s leading telecom groups in emerging markets.

BIRD Cyber

BIRD Cyber

BIRD Cyber is a program to promote collaboration on cybersecurity and emerging technologies aimed at enhancing the cyber resilience of critical infrastructure.

Dutch Research Council (NWO)

Dutch Research Council (NWO)

The Dutch Research Council (NWO) is one of the most important science-funding bodies in the Netherlands and ensures quality and innovation in science.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

ProjectDiscovery

ProjectDiscovery

ProjectDiscovery is an open-source, cybersecurity company that builds a range of software for security engineers and developers.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

Espria

Espria

Espria is a leading independent managed service provider with expertise in Cloud, IT, Communications and Document Solutions.

Complete Cyber

Complete Cyber

Complete Cyber provide professional cybersecurity services and products to help secure your infrastructure, systems and data.