TECHNOLOGY > > Developments


« Back to News

2018-04-17

Death by Robot

As the use of autonomous machines increases in society, so too has the chance of robot-related fatalities.

2018-04-12

AI Won’t Replace The Human Brain

Startup Nectome thinks it is possible to create a map of all of the brain's neuron connections, a "connectome", to make an artificial reconstruction.

2018-04-09

IBM’s Watson Takes On The IoT

IBM Watson Assistant is a new artificial intelligence assistant designed to work with autonomous and IoT devices.

2018-03-29

DARPA Wants AI To Reveal Adversaries' True Intentions

The US Defense Advanced Research Projects Agency will use AI to understand and detect how adversaries are using deception & covert tactics.

2018-03-27

Cognitive Computing And AI Compared

Artificial Intelligence and Cognitive Computing are really not the same thing. One simulates human intelligence, the other improves it.

2018-03-23

Russia Can Disconnect From The Internet

Russia has prepared the infrastructure to support a digitally isolated state, capable of operating independently from the World Wide Web.

2018-03-20

How AI Has Conquered Democracy

Big Data analysis can maximise the effectiveness of an election campaign and use of AI techniques in politics is not going away anytime soon.

2018-03-19

Big Data And AI For Predicting Human Behaviour

Artificial intelligence has set a benchmark in every other industry and is now all set for behavioral science.

2018-03-16

Blockchain: What Business Executives Need To Know

Everyone serious about business and enterprise should have at least a basic understanding of how blockchain technology works and what it can do.

2018-03-13

Singapore Sets Up A Cybersecurity Start-Up Hub

Singapore is setting up its first cybersecurity start-up incubation hub, as the nation strives to carve out a role in the digital economy.

2018-03-13

The Pentagon Puts Google’s AI To Use

Open source AI technology originally developed by Google is finding its way into big budget US military programs.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Defense Advanced Research Projects Agency (DARPA)

Defense Advanced Research Projects Agency (DARPA)

DARPA's mission is to develop breakthrough technologies for national security. The Information Innovation Office undertakes cyber security activities.

GigaOm

GigaOm

GigaOm's mission is to provide enterprises with information and analysis to help them make better decisions about technology.

Titus

Titus

Titus is a global leader in enterprise-grade data protection solutions.

Herbert Smith Freehills

Herbert Smith Freehills

Herbert Smith Freehills is a leading professional services including data protection and privacy.

Aspisec

Aspisec

Aspisec is a cybersecurity company specialized in Firmware Security and Critical Infrastructure Protection.

ABS Group

ABS Group

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations.

KeyXentic

KeyXentic

KeyXentic Inc. is a professional mobile and data security service provider. We are devoted to design convenient and strong security for user’s data protection and privacy without any compromise.

OpSec Security

OpSec Security

OpSec Online is the only brand protection solution that spans all channels so your brands are protected no matter what digital venue the criminals target.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

Perygee

Perygee

Perygee is a fully integrated platform for operational security. Companies depend on Perygee to identify and streamline the most important security practices for their operations.

Sansec

Sansec

Sansec is the global leader in eCommerce malware and vulnerability detection. We help you to stay ahead of hackers!

Approov

Approov

Approov provides a comprehensive runtime security solution for mobile apps and their APIs, unified across iOS and Android.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

ASPIA InfoTech

ASPIA InfoTech

ASPIA Infotech is a leading Information and cybersecurity organization focused on innovative approaches to avert targeted attacks.

Vector Choice Technologies

Vector Choice Technologies

Vector Choice Technology Solutions has a long standing reputation in cyber security consulting since 2008.

Ignite Cyber

Ignite Cyber

IGNITE Cyber is focused on enabling secure technology adoption through intelligent business decisions. We are focused on providing a secure and stable business environment for everyone.