TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2025-04-09

Britain Falls Under Pressure To Relax Regulations On AI

The British government is warned to relax copyright laws and to allow Artificial Intelligence firms build new products in a less restricted way.

2025-04-07

The Security Risks Behind Shadow ML Adoption 

Defending AI: As AI models become more advanced and widely deployed, security concerns continue to mount. By Shachar Menashe

2025-04-01

Elon Musk Has Sold X To His xAI Company

Social Media & AI Intertwined: Combining data, models, distribution and talent - the combination creates greater power & influence for Musk.

2025-03-31

Half of Employees Use Shadow AI 

Non-Approved AI Tools: Personal AI tools are so valuable that half of workers would not give them up, even if their organization banned them.

2025-03-25

Manus - A Fully Autonomous Artificial Intelligence

Far-Reaching Implications: Manus operates autonomously, can multi-task seamlessly and complete jobs without instructions or human interaction.

2025-03-24

British Science Minister Uses ChatGPT For Policy Advice

The Minister responsible for Scince & Technology has defended his use of AI, saying that while he uses the tool, it does not replace expert advice.

2025-03-25

Combatting Rising AI Attacks With AI-Powered Defences 

User & Entity Behaviour Analytics: An effective approach to detect unknown threats by focusing on behavioural anomalies. By Kev Eley

2025-03-24

Britain Plans To Use  AI To Run Public Services

Making Artificial Intelligence Work For The People: The British government aims to harness AI technology and drive public sector efficiency.

2025-03-21

Artificial Intelligence - Real Risk

The Security Challenges Of Rapid AI Adoption: Unvetted AI opens the door to risks that can seriously disrupt business. By Ellen Benaim

2025-03-04

The Urgency Of AI Governance

Rapid Adoption Of AI-Driven Solutions: The lack of proper AI governance exposes businesses to financial, regulatory & reputational risks.

2025-03-05

DeepSeek - A Deep Dive Reveals More Than One Red Flag

DeepSeek has several vulnerabilities, exposing organisations to privacy breaches, regulatory violations & reputational damage. By Aditya K Sood

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

DLA Piper

DLA Piper

DLA Piper is a global law firm with offices throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity.

Bryan Cave LLP

Bryan Cave LLP

Bryan Cave LLP is a global business and litigation law firm. Practice areas include Data Privacy and Security.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

Quality Professionals (Q-Pros)

Quality Professionals (Q-Pros)

QPros are a recognized leader in providing full-cycle software quality assurance and application testing services.

Invensis Learning

Invensis Learning

Invensis Learning is a professional training and certification company providing IT Service Management, IT Security & Governance, DevOps, Cloud Computing and Digital Awareness training.

Cryptshare

Cryptshare

Cryptshare is a communication solution that enables you to share e-mails and files of any size securely.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

GuardSight

GuardSight

GuardSight is a provider of specialized cybersecurity services to safeguard businesses, government, and remote workers against sophisticated cyber threats.

Tactical Network Systems (TNS)

Tactical Network Systems (TNS)

Tactical Network Solutions helps you discover hidden attack vectors in IoT and connected devices before someone else does.

Almond

Almond

Almond is positioned as a key independent French player in audit and consulting in the fields of Cybersecurity, Cloud and Infrastructure.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

Privasee

Privasee

Make GDPR compliance simple with Privasee. Our software makes it easy to protect your data and ensure you’re compliant with the new regulations.

SIEM Xpert

SIEM Xpert

SIEM Xpert is a leader in Cyber Security Trainings and services since 2015.

OneStep Group

OneStep Group

OneStep Group are a leading Australian provider of information and communications technology (ICT) services, connecting businesses through technology solutions and support.

Blackmere Consulting

Blackmere Consulting

Blackmere Consulting is a Nationwide Technical and Executive Recruiting firm dedicated to Cyber Security and Information Technology.