TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2023-09-25

Is Your Business Ready To Embrace Artificial Intelligence? 

AI presents itself in a different way - it’s an entirely new area that requires continuous development and a new set of rules. By Andy Dunn

2023-09-22

Exploring How Generative AI Is Contributing To Cybersecurity Threats & Risks

Generative AI is transforming businesses, while simultaneously posing significant risks and dangers in the hands of hackers. By Farwa Sajjad

2023-08-24

AI Is The Next Big Thing For Browser Security  

A New Class Of Automated Attacks: As the access point for most online services, the browser is a pivotal point for cyber attacks. By Brett Raybould

2023-09-04

Generative AI Could Replace The Internet

Transformational Technology: Generative AI is quickly becoming much more sophisticated and is poised to unleash the next wave of productivity.

2023-08-29

Understanding Generative AI

The potential of Generative AI to revolutionise content creation makes it important to understand what is, how it’s being used and by whom.

2023-08-29

Numerous Organisations Are Banning ChatGPT

A Permanent Ban: Fears around the potential misuse of generative AI tools such as ChatGPT are spreading among IT decision makers.

2023-08-22

How AI & VoIP Are Revolutionizing Communications

AI Powered Interactions: AI has a real chance to revolutionize communication in manners that humans are only now starting to fully comprehend.

2023-08-21

US Defense Agency Announces Major AI Challenge

DARPA has launched a two-year cybersecurity competition that will use Artificial Intelligence to protect the United States’ most important software.

2023-08-14

Understanding Malvertising Attacks

Lack of awareness, plus easier access to AI tools, provides the perfect cocktail for even inexperienced threat actors to exploit. By Tom McVey

2023-08-10

Fighting Fake News Using Machine Learning & Blockchains

The proliferation of misinformation and fake news in the digital age has become a critical societal concern.

2023-08-04

Generative AI Tools Help Criminals Launch More Sophisticated Attacks

WormGPT: Even attackers with limited skills can use this technology, making it an accessible tool for a broader spectrum of cyber criminals.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Paramount Computer Systems

Paramount Computer Systems

Paramount is a regional leader in the Middle East for cybersecurity solutions and consulting services.

Myra Security

Myra Security

The fully automated Myra DDoS Protection reliably protects web applications, websites, DNS servers, and IT infrastructures.

CyberSure

CyberSure

CyberSure is a programme of collaborations and exchanges between researchers aimed at developing a framework for creating and managing cyber insurance policy for cyber systems.

Cyber Threat Alliance

Cyber Threat Alliance

CTA is working to improve cybersecurity of our digital ecosystem by enabling near real-time cyber threat information sharing among companies and organizations in the cybersecurity field.

DataPassports

DataPassports

DataPassports is a data-centric security and privacy solution that enforces privacy and security from end-to-end with transparent protection of data at the source.

Kinnami Software

Kinnami Software

Kinnami is a data security company that equips organizations with the tools they need to secure and protect highly confidential documents and data.

Precursor Security

Precursor Security

Precursor Security are information security specialist, delivering all aspects of Security testing, Cyber Risk Management, and Continuous Security Testing.

Raman Power Technologies

Raman Power Technologies

Raman Power Technologies focus on bringing value and solving business challenges through the delivery of modern IT services and solutions including cybersecurity.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

Vircom

Vircom

With a large majority of cyber attacks starting with email, Vircom provides protection against the worst email security threats to your business.

DataSolutions

DataSolutions

DataSolutions is a leading value-added distributor of transformational IT solutions in the UK and Ireland.

Creative Destruction Lab (CDL)

Creative Destruction Lab (CDL)

Creative Destruction Lab is a nonprofit organization that delivers an objectives-based program for massively scalable, seed-stage, science- and technology-based companies.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

Moonsense

Moonsense

Moonsense is on a mission to level the playing field in the fight against online fraud.

Dynamic Networks

Dynamic Networks

Dynamic Networks provide Managed Cloud Services; Unified Communications; Security & Compliance Services and Network & Infrastructure Services for both Public Sector and Private sector businesses.

Entitle

Entitle

Entitle's SaaS-based platform automates how permissions are managed, enabling organizations to eliminate bottlenecks and implement robust cloud least privilege access.