TECHNOLOGY > > Developments


« Back to News

2019-03-29

Combining AI’s Power With Self-Centered Human Nature Could Be Dangerous

Its is not safe to think that as AI develops it will become more human-like.The reality is likely to be far more disconcerting and incomprehensible.

2019-03-27

What's The Difference Between AI And Machine Learning?

Artificial intelligence and machine learning are often lumped together and its easy for people to mistake them as synonymous. They are not.

2019-03-25

US Army Wants To Convert Tanks Into Autonomous Weapons

The US Army plan to build AI - directed tanks is'“another significant step towards lethal autonomous weapons.”

2019-03-25

AI Will Not Replace Soldiers

Artificial Intelligence is poised to change the character of the future battlefield and the pace of threats faced in today’s security environment.

2019-03-19

National Security & Surveillance In The Age Of AI

GCHQ chief says the UK intelligence community needs to gain public trust regarding the use of Artificial Intelligence for national security purposes.

2019-03-12

Huawei 5G Risk Can Be ‘Contained’

Britain's spy agencies believe the threat of espionage arising from Huawei's 5G engineering and security capabilities can be managed.

2019-03-06

Blockchain’s Newest Application Is Civil Aviation

Blockchain networks and smart contracts can help mitigate some of the most difficult security issues in the aviation industry.

2019-02-21

IoT Is In The Dark When It Comes To ePrivacy

As if GDPR wasn’t enough of a challenge, the new ePrivacy regulation is set to shake things up massively when it comes to the Internet of Things.

2019-03-04

Trump Wants US Government To Prioritise AI

President Trumps instructs US Federal Agencies to focus on AI to help promote US industrial development.

2019-02-28

Could An AI Arms Race Lead To Accidental War?

Chinese experts worry that a rush to integrate AI into weapons and other military equipment could accidentally lead to war between nations.

2019-02-27

Facebook Is Moving Fast To Get Into Blockchain

Facebook is building its war chest for blockchain, from open hiring to bringing in top talent by acquiring start-up company Chainspace.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

EuroISPA

EuroISPA

EuroISPA is a pan European association of European Internet Services Providers Associations and the world’s largest association of ISPs.

ThreatAdvice

ThreatAdvice

ThreatAdvice is a provider of cybersecurity education, awareness and threat intelligence.

Cybersecurity & Infrastructure Security Agency (CISA)

Cybersecurity & Infrastructure Security Agency (CISA)

CISA leads the national effort to defend critical infrastructure against the threats of today and to secure against the evolving risks of tomorrow.

BlueFiles

BlueFiles

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing.

SITA

SITA

SITA is a multinational information technology company providing IT and telecommunication services to the air transport industry including vulnerability assessments and managed security services.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

Vigilant Software

Vigilant Software

Vigilant Software develops industry-leading tools for intelligent, simplified compliance, including ISO27001-risk management and EU GDPR.

ArmorText

ArmorText

ArmorText offers a seamless channel for communication and collaboration for organizations concerned with keeping communication data private and secure.

Hub One

Hub One

Hub One is a leading player in digital transformation with expertise in broadband connectivity, business solutions for traceability and mobility, IOT in industrial environments and cybersecurity.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

SandboxAQ

SandboxAQ

SandboxAQ is an enterprise SaaS company combining AI + Quantum tech to solve hard problems impacting society.

Persistent Systems

Persistent Systems

Persistent Systems are a trusted Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients.

Arcserve

Arcserve

Defend your data with Arcserve all-in-one data protection and management solutions designed to be the right fit for your business, regardless of size or complexity.

Loccus AI

Loccus AI

Loccus are developers of AI solutions in the voice safety space. We build identity verification solutions, deepfake detection systems and fraud protection products for companies and end-users.