TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2022-03-15

Using Social Media To Track The Pandemic

Using historic data to predict future behaviour is very problematic, not least because humans, like the coronavirus, are capable of mutation.

2022-02-21

Rewired: An AI That Can Learn Like A Human Brain

A brain-inspired computer chip that is capable of rewiring itself as it learns, could transform development of human-level Artificial Intelligence. 

2022-02-16

Military Operating Systems Bring AI To The Battlefield

USA vs China: There is an arms race in Artificial Intelligence with the aim to gain decision-making dominance on the battlefield of the future.

2022-02-10

Autonomous Technology To Prevent Collisions At Sea

The US Navy is looking for autonomous collision avoidance and control technologies capable of supporting safe navigation in its ships & submarines.

2022-02-09

High-Tech Lie Detection Systems

Brain-scanning technologies & cheaper computing power offer powerful new lie-detection tools based on measuring cognitive changes.

2022-01-31

Artificial Intelligence Is Increasingly Important In Cyber Security 

Force Multiplier: AI offers major advantages for protecting people, systems & organisations from the relentlessly growing range of cyber threats.

2022-01-11

Super Intelligent Machines Need An Off Switch

They’re Already Here: An AI system with superior intelligence to humans could learn independently & have access to all the data of humanity.

2022-01-03

Artificial Intelligence Monitors Critical Infrastructure

Artificial Intelligence and video surveillance tools are being being increasingly adopted to monitor and protect critical infrastructure facilities.

2021-12-22

Microsoft's New AI Debugging Tool

BugLab: Microsoft’s concept is to develop an AI that can automatically find and repair software bugs using a 'hide and seek' game as the model.

2021-12-21

The Pentagon Needs To Change How It Does AI

The US Defense establishment needs a more integrated approach to AI if it is to translate its technical capabilities into effective military tools.

2021-12-02

Clearview Faces £17 Million Penalty For Breaching Data Laws

The data of a substantial number of Britons may have been scraped from social media platforms and other online sources without consent.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

PFP Cybersecurity

PFP Cybersecurity

PFP provides a SaaS solution for life-cycle protection based on our IoT security platform and power usage analytics.

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies provides artificial intelligence solutions and information security solutions.

CSI

CSI

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries.

Gradiant

Gradiant

Gradiant’s mission is to contribute to the growth and competitive improvement of Galician businesses through technology development and innovation using ICT.

Cog Systems

Cog Systems

Cog Systems offer an embedded solution built on modularity, proactive security, trustworthiness, and adaptability to enable highly secure connected devices.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

Digital Beachhead

Digital Beachhead

Digital Beachhead has the expertise to provide a range of Cyber Risk Management and other Professional Services with specifically tailored solutions at competitive prices.

NCC-CSIRT (Nigerian Communications Commission)

NCC-CSIRT (Nigerian Communications Commission)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Nine23

Nine23

Nine23 are a highly focused cyber security solutions company that defines, builds and manages innovative services, enabling end-users to use technology securely in today’s workplace.

Akto

Akto

Akto, the plug & play API security platform. Discover your APIs, run tests and find business logic vulnerabilities at ludicrous speed.

EdgeWatch

EdgeWatch

EdgeWatch is a platform that helps information accredited security practitioners discover, monitor, and analyze devices that are accessible from the Internet.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.

LeakSignal

LeakSignal

At LeakSignal, we transform the way you monitor and protect your data. We provide unparalleled visibility and control over your sensitive data flows.

Whiteswan Identity Security

Whiteswan Identity Security

At Whiteswan, we are committed to protecting the digital landscapes of modern enterprises with adaptive, identity-first security solutions that ensure trust, compliance, and resilience.