TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2021-07-22

IBM Watson In Demand

IBM Watson's 'AI-for-Hire' service is poised to grow 30%, driven by Healthcare and Financial Services customers looking for real time data processing.

2021-07-20

Artificial Intelligence Is Being Badly Used In Cyber Security

With many more enterprises using AI technology, it’s time to analyse the possible negative impacts of AI's implementation in cyber security.

2021-07-05

Artificial Intelligence Can Reduce Cyber Attacks

AI is an effective solution to protect organisations from cyber attacks, but it can also be used by hackers to launch complex, automated attacks.

2021-06-29

China Is Gaining Technical Supremacy

British spy chiefs warn that leadership in key technologies affecting national security, including AI and Quantum Computing, is moving East.

2021-06-21

Drones Kill Without Human Control

Turkish built autonomous drones with an explosive charge are now reported working without human control as battlefield killers in Libya.

2021-06-15

AI Dominance On The Battlefield

AI is already part of our lives and as the technology matures it will play a key role in future wars, using sensory-intelligent remote weapons.

2021-06-08

Future Threats Are Growing Closer

Cyber security experts are becoming more concerned about the near term future when cyber attacks will be driven by Artificial Intelligence.

2021-06-01

Can Ethical AI Become A Reality?

The ethical, social and legal aspects of AI systems must be better understood if the many potential negative consequences are to be avoided.

2021-06-03

Electronic Espionage Will Use AI Instead Of Spies

The British spy agency GCHQ has produced a roadmap for how they intend to make ethical use Artificial Intelligence to replace human operatives.

2021-05-04

Risks Of Bias In ‘Emotional AI’

Facial recognition mass surveillance software used to scan crowds to detect doubt and anger as emotions that indicate potential threats, is not safe.

2021-04-27

Industry 5.0 Will Transform The Workplace

Connectivity: Just when you were starting to get a handle on Industry 4.0, the next technolgical step change has already begun to take shape.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

Join this webinar to learn how the cloud threat landscape is evolving and organizations are deploying more advanced and capable security controls at scale.

Jones Day

Jones Day

Jones Day is an international law firm based in the United States. Practice areas include Cybersecurity, Privacy & Data Protection.

Rollbar

Rollbar

Rollbar is a full-stack error monitoring platform for web and mobile applications. We help developers find and fix bugs fast. Built by developers for developers.

Netsafe

Netsafe

Netsafe is an independent, non-profit New Zealand organisation focused on online safety. We help people stay safe online by providing online safety education, advice and support.

AlAnsari Technical Solutions (ATS)

AlAnsari Technical Solutions (ATS)

ATS is a Kuwait based company specialised in delivering hardware/software, Virtualisation, IP Telephony / Unified Communication, Networking and professional IT services and solutions.

Government CSIRT - Chile

Government CSIRT - Chile

Government CSIRT is the Computer Security Incident Response Team for State networks and government cyberspace in Chile.

European Society of Criminology (ESC)

European Society of Criminology (ESC)

The ESC Working Group on Cybercrime is focused on cybercrime, its causes and offenders, impact on victims, and our response to it at the individual, corporate, and governmental levels.

Inseego

Inseego

Inseego provides Enterprise SaaS solutions and IoT & Mobile solutions, which together form the backbone of intelligent, reliable and secure IoT services with deep business intelligence.

Axonius

Axonius

Axonius is the only solution that offers a unified view of all assets and their coverage, empowering customers to take action to enforce their organization’s security policies.

Cyan Securiy Group

Cyan Securiy Group

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

International Cybersecurity Institute (ICSI)

International Cybersecurity Institute (ICSI)

ICSI is a UK company offering specialized and accredited professional qualifications in cybersecurity for young IT graduates as well as mature professionals.

Olympus Sky

Olympus Sky

Olympus Sky has created a complete security system that is specifically designed to meet the challenges of IoT, including all of the deficiencies currently challenging Public Key Infrastructure.

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC)

Vietnamese Security Network (VSEC) is an information security company providing website vulnerability scanning and monitoring services.

Meditology

Meditology

Meditology Services is a top-ranked provider of information risk management, cybersecurity, privacy, and regulatory compliance consulting services exclusively for healthcare organizations.

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce has partnered with Purdue University and Carnegie Mellon University to create the Rolls-Royce Cybersecurity Technology Research Network.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.