TECHNOLOGY > Key Areas > Artificial Intelligence


« Back to News

2024-10-08

There Are Ways You Can Detect A Deepfake

Discerning Truth From Fiction: The rapid adoption of AI to to generate fictitious images makes it important to be able to spot deepfake content.

2024-10-01

Meta To Use Facebook & Instagram Posts To Develop AI Tools

Illegal In The EU: Meta is given conditional permission to use anonymized posts from British Facebook & Instagram users to train AI models.

2024-09-22

EC-Council Unleashes AI-Powered Ethical Hackers On Cybercrime

EC-Council: CEH v13 certification equips cybersecurity professionals with essential AI skills & knowledge to prepare them for new era of cybercrime.

2024-09-26

AI-Powered Translation: A Bridge Between IT & Business

AI-powered translation can break down language barriers, particularly when it comes to translating complex technological jargon. By Paul Maksimovic 

2024-09-24

International Agreement To Regulate Artificial Intelligence

Britain Signs First International AI Treaty: The signatories commit to collective action to manage AI products & prevent its potential misuse.

2024-09-09

Criminally Exploiting AI Tools To Generate Illicit Revenue From Music Streaming

The accused claimed more than $10m in music royalty payments using AI tools and a network of bots, in a highly sophisticated long-term fraud.

2024-09-06

How AI Will Help Disrupt Elections Around The Globe

Generative AI is an attractive option for politically driven and nation state-sponsored threat actors. What can stop them? By Craig Watt

2024-09-04

Global AI Safety: Scientists Can Move The Needle

As differences in political values & priorities intensify cooperation on AI safety, scientist-led dialogue shows its worth. By Isabella Wilkinson

2024-09-01

AI & Biometrics In Cybersecurity

Securing the Digital Frontier: AI and Biometrics have a place in the cybersecurity measures needed to defend against cyber threats.

2024-08-30

China Aims to Compete With OpenAI, Gemini & Grok

Update: OpenAI’s decision to ban their products in China is accelerating the rise of Chinese AI companies, in fierce competition with US platforms.

2024-08-27

Prioritizing Data Security In The Age Of Generative AI

The integration of generative AI brings a wave of innovation, but it also introduces new cybersecurity risks to protecting your data. By Samer Diya

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Blue Frost Security

Blue Frost Security

Blue Frost Security provides high-level IT security consulting, penetration testing services, ISO 27001 Solutions, PCI compliance solutions and training.

Globalscape

Globalscape

Globalscape is a leader in secure data exchange solutions.

QA Systems

QA Systems

QA Systems provides software testing solutions for safety and business critical sectors and software safety and security standards.

Detack

Detack

Detack is an independent supplier of IT security auditing and consulting services.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

CyberSift

CyberSift

CyberSift is a cyber security provider. We develop threat detection software which needs no infrastructure changes as it integrates with almost any security tool.

Nexthink

Nexthink

Using our solution, hundreds of IT departments effectively balance offering a productive and enjoyable end-user experience with making the right decisions to secure and transform the digital workplace

Payatu

Payatu

Payatu Technologies is a security testing and services company specialized in Software, Application and Infrastructure security assessments and deep technical security training.

NetSecurity

NetSecurity

NetSecurity is a Brazilian company specializing in Information Security. We provide Managed Security Services (MSS), network security solutions and other specialist services.

Cyber Science

Cyber Science

Cyber Science is the flagship conference of C-MRiC, focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.

TrustMAPP

TrustMAPP

TrustMAPP automates cybersecurity & privacy assessments, with universal workflow, allowing teams to generate analytics and recommendations to align priorities for improvement.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

Talon Cyber Security

Talon Cyber Security

Talon delivers the leading enterprise browser designed to bring security to managed and unmanaged devices, regardless of location, device type or operating system.

PSafe

PSafe

PSafe is a leading provider of mobile privacy, security, and performance apps. We deliver innovative products that protect your freedom to safely connect, share, play, express and explore online.

CoreStack

CoreStack

CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.