TECHNOLOGY > > Developments


« Back to News

2018-04-26

Artificial Intelligence Is Too Narrow

AI is based on sophisticated algorithms and the brute force of huge computing power. This makes it powerful, but its very specificity is a problem.

2018-04-25

Listening To Your Inner Voice

MIT researchers invent a wearable device that can read people’s internal voice, allowing them to control devices and ask queries without speaking.

2018-04-27

How AI & Machine Learning Can Revolutionise eCommerce

Its Not Just Amazon: As the right data and expertise fall into place, AI and machine learning will be game changers for eCommerce brands.

2018-04-25

The Apps That Map Violence

Residents of Rio de Janeiro are flocking to use crowdsourcing apps and following the social network pages of crime-watch groups for safety.

2018-04-23

The Cambridge Analytica Scandal 'highlights need for AI regulation'

British legislators are worried about the potential for misuse & monopolisation of data by big technology companies operating in the UK.

2018-04-20

Google Chairman Unaware Of Pentagon AI Project

Google is bidding for a multi-billion dollar Pentagon cloud contract. Which comes as news to the company Chairman, Eric Schmidt.

2018-04-19

How AI Will Define New Industries

AI expertise is more focused on commercial applications that optimise efficiencies in existing industries than on those that build new industries.

2018-04-24

Will AI Replace Most Jobs?

The persistent question about artificial intelligence, or “robots” in common parlance, is whether they will make human workers obsolete.

2018-04-30

AI And Blockchain In A Disruptive World

AI and blockchain enable a big threat from decentralisation but also create enormous opportunities for businesses to advantage from.

2018-04-27

IBM Watson AI Assistant Can Now Work With Autonomous Devices

IBM’s Watson is introducing Watson Assistant, designed to “help bridge the information and data sharing gap between people and things.”

2018-04-18

Human vs Machine Attack Response

Machine automation gives attackers the ability to quickly scale up attacks far beyond human capacity. But automation has its limits.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Affairs

Cyber Affairs

Cyber Affairs is the first Italian press agency entirely dedicated to cyber security.

ENEA Qosmos Division

ENEA Qosmos Division

Qosmos, a division of Enea, leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures.

Truepic

Truepic

Truepic provides technologies that prevent fraud, identity theft, misinformation, and disinformation caused by generative, manipulated, or deepfake digital content.

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

Cyan Securiy Group

Cyan Securiy Group

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

Lewis Brisbois

Lewis Brisbois

Lewis Brisbois offers legal practice in more than 40 specialties, and a multitude of sub-specialties including Data Privacy & Cybersecurity.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

International Association of Security Awareness Professionals (IASAP)

International Association of Security Awareness Professionals (IASAP)

IASAP provides a members-only virtual sharing platform where security awareness professionals engage in a lively, year-round exchange of information and ideas.

Charterhouse Voice & Data

Charterhouse Voice & Data

Charterhouse is your trusted technology partner - designing, provisioning and supporting the technology that underpins your operations including network security and data compliance.

SecureDrives

SecureDrives

Passwordless Authentication & Encrypted Data Storage Solutions from SecureDrives. We are enabling organisations to work safely and securely, using technology driven solutions.

Secjur

Secjur

Secjur is a provider of AI-based compliance tools that aim to put compliance, data protection, information security and whistleblowing on autopilot.

AccessIT Group

AccessIT Group

AccessIT Group is a specialized cybersecurity solutions provider offering a full range of advanced security services.

InQuest

InQuest

InQuest specialize in providing comprehensive network-based security solutions that empower organizations to protect their most critical assets: their people.

SignPath

SignPath

SignPath provides leading-edge software and SaaS services that ensure code integrity from development to distribution.

NetSentries Technologies

NetSentries Technologies

NetSentries provide smart cybersecurity solutions and services to protect Governments, Enterprise and Individuals from threats through a comprehensive range of protocols, products and services.