TECHNOLOGY > > Developments


« Back to News

2018-02-22

AI Will Underpin Cybersecurity

Cybersecurity risks are growing in complexity and volume, but artificial intelligence techniques can help businesses fight them in real time.

2018-02-21

AI In Conflict: Cyberwar & Robot Soldiers

Munich Security Conference: The use of robots and artificial intelligence within the military sphere might make the whole world more unstable.

2018-02-19

What Does The US Air Force Want From AI?

Amongst other things, the answer is the capability to shoot someone in the face from 200 Kilometers away.

2018-02-14

Blockchain To Secure Storage Of Sensitive Data

Blockchain technology can improve on current, centralised data security solutions and help keep vital information safe and under control.

2018-02-15

AI Cyber Attacks Will Be Almost Impossible For Humans to Stop

Coming Soon: Truly autonomous weaponised artificial intelligence that delivers its blows slowly, stealthily and virtually without trace.

2018-02-13

Will AI Make Data Analytics Jobs Obsolete?

Data analytics is one of the hottest fields in IT and one of the most in-demand jobs in the broader market. But AI is catching up.

2018-02-08

The AI Lock In Loop

Big technology companies are building AI into their products not only to outperform competitors but to create barriers to new entrants.

2018-02-06

Russia's New Generation Of Military Robots

Russian defence technology is inching ahead of its competition in designing, testing & deploying a wide variety of unmanned systems harnessing AI.

2018-02-03

AI Can Turn Hollywood Stars Into Pornographic Actors

The sex industry is turning to advanced machine learning technology to create fake pornography featuring legitimate actors and celebrities.

2018-02-09

Killer Robots Will Be Ubiquitous In The US Army

In future, every US combat vehicle is going to have the capability to be robotic and to deliver 'solid lethality'.

2018-01-31

Facebook Names IBM Watson Executive AI Chief

Facebook brings in an experienced ex-IBM manager to navigate the company’s broadening ambitions for how AI can shape its products.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

AA Certification (AAC)

AA Certification (AAC)

AAC provide ISO Quality Management System certification services including ISO 27001.

Quality Professionals (Q-Pros)

Quality Professionals (Q-Pros)

QPros are a recognized leader in providing full-cycle software quality assurance and application testing services.

ATSEC Information Security

ATSEC Information Security

ATSEC is an independent, privately-owned company that focuses on providing laboratory and consulting services for information security.

BELAC

BELAC

BELAC is the national accreditation body for Belgium.

European Cyber Security Conference

European Cyber Security Conference

EU Cyber Security Conference will debate what Europe’s response to evolving threats in a dynamic global risk landscape should look like and what the next steps for all actors of the ecosystem.

Stratus Cyber

Stratus Cyber

Stratus Cyber is a premier Cyber Security company specializing in Managed Security Services. Our services include Blockchain Security, Pentesting, and Compliance Assessments.

Granted Consultancy

Granted Consultancy

Granted Consultancy is a business consultancy that specialises in securing funding to support companies with the development and commercialisation of new and innovative products and technologies.

Security Alliance

Security Alliance

Security Alliance provide bespoke cyber intelligence consulting and research services.

Riskaware

Riskaware

CyberAware, by Riskaware, provides business-critical cyber attack analysis and impact assessments using NIST standards aligned with NCSC guidance.

Udacity

Udacity

Udacity's mission is to train the world’s workforce in the careers of the future. Our programs range from beginner to expert levels and deliver the hands-on skills for real-world expertise.

Immunefi

Immunefi

Immunefi provides bug bounty hosting, consultation, and program management services to blockchain and smart contract projects.

Sidcon International Consulting Company

Sidcon International Consulting Company

SIDCON International Consulting Company has been providing consulting services since 2002 for private and public organizations in Ukraine and other countries.

AccessIT Group

AccessIT Group

AccessIT Group is a specialized cybersecurity solutions provider offering a full range of advanced security services.

ThreatView by Turaco Labs

ThreatView by Turaco Labs

ThreatView combines extensive experience in digital forensics with advanced analytics and threat detection capabilities to protect eCommerce websites.

SITS Group

SITS Group

SITS Group excel in delivering a comprehensive range of Cyber Security consulting and managed services, from cloud transformation to risk management.