The next wave of Internet of Things (IoT) analytics development will fully converge with the big data domain. Simultaneously, the value in the technology stack is shifting beyond the hardware and middleware to analytics and value-added services, such a…Read More IoT ML and AI services to reach $3.6 billion in 2026
The trade-off between widespread technology adoption and responsible use often lies on the spectrum of privacy. When it comes to technologies fueled by data, such as artificial intelligence (AI), it’s even harder to strike the balance between equitable…Read More How to strike the balance between privacy and personalization in healthcare and beyond
Scality announced the results of a Vanson Bourne survey completed by IT decision makers across the UK, France and Germany. It revealed a fundamental shift in the industry towards flash-based object storage to fuel AI, ML, automation, and big data analy…Read More Move to all-flash object storage to occur within five years
At the recent ITWC Digital Transformation Conference, Chris Mullens, Executive Director of the Workforce Institute, UKG, shared his thoughts on how AI and analytics are enabling organizations to pivot quickly, keep people safe and connected, and provide management with instant access to trends. Technology writer Steve Prentice was on hand and shared his thought on […]Read More Leveraging technology to build trust
As companies look to expand their use of artificial intelligence (AI) and machine learning (ML) to keep up with the demands of their customers, they are facing hurdles getting these projects to production and ultimately deliver the desired results to t…Read More IT decision-makers doubt current data architectures will meet future model inferencing requirements
With the emphasis on reducing dependency on the oil industry, several Middle Eastern countries are formulating strategies to boost the contribution of the Information and Communications Technologies (ICT) market to the gross domestic product (GDP). Mid…Read More Middle East ICT market expected to reach $95.05 billion by 2025
AI-based recommendation systems are used in many online services we enjoy today, including search engines, online shopping sites, streaming services, and social media. However, their growing influence over what people see and do on the internet has rai…Read More Secure AI is the foundation of trustworthy AI
More than half of IT and cybersecurity professionals noted ransomware or zero-day attacks as the biggest threats to their organization, according to a Deep Instinct survey. The report highlights current and emerging threats, the impact these have on th…Read More The impact of current and emerging threats on the day-to-day lives of SecOps teams
The Center for Security and Emerging Technology has a new report: “Machine Learning and Cybersecurity: Hype and Reality.” Here’s the bottom line:
Read More The Future of Machine Learning and Cybersecurity
The report offers four conclusions:
- Machine learning can help defenders more accurately detect and triage potential attacks. However, in many cases these technologies are elaborations on long-standing methods — not fundamentally new approaches — that bring new attack surfaces of their own.
- A wide range of specific tasks could be fully or partially automated with the use of machine learning, including some forms of vulnerability discovery, deception, and attack disruption. But many of the most transformative of these possibilities still require significant machine learning breakthroughs.
Malicious COVID-19 online content – including racist content, disinformation and misinformation – thrives and spreads online by bypassing the moderation efforts of individual social media platforms. By mapping online hate clusters across si…Read More Malicious COVID-19 online content bypassing moderation efforts of social media platforms
Anodot announced the results of a survey that reveals how organizations struggle to control skyrocketing cloud computing costs of the remote workforce, even as business moves to a hybrid model. In Q2 of 2021, more than 100 senior IT, finance, and opera…Read More Cloud computing costs skyrocketing as businesses support a remote workforce
Installing a network sandbox to safeguard against external threats has been accepted by many as the gold standard for more than a decade. Sandbox-based cybersecurity solutions are a protected and isolated environment on a network that simulates a compa…Read More Are your cyber defenses stuck in the sandbox?
Read More The Supreme Court Narrowed the CFAA
In a ruling delivered today, the court sided with Van Buren and overturned his 18-month conviction.
In a 37-page opinion written and delivered by Justice Amy Coney Barrett, the court explained that the “exceeds authorized access” language was, indeed, too broad.
Justice Barrett said the clause was effectively making criminals of most US citizens who ever used a work resource to perform unauthorized actions, such as updating a dating profile, checking sports scores, or paying bills at work…
Microsoft researchers just released an open-source automation tool for security testing AI systems: “Counterfit.” Details on their blog.Read More AI Security Risk Assessment Tool
After developing a tool for testing the security of its own AI systems and assessing them for vulnerabilities, Microsoft has decided to open-source it to help organizations verify that that the algorithms they use are “robust, reliable, and trust…Read More Counterfit: Open-source tool for testing the security of AI systems
Counterfit is a command-line tool for security professionals to red team AI systems and systematically scans for vulnerabilities as part of AI risk assessment.Read More AI security risk assessment using Counterfit
Wading through waves of alert noise to find real threats and manually connecting the dots to find context in real-time attacks are essential capabilities in today’s cyberthreat detection and response battleground. While it sounds impossible, the same t…Read More Knowledge graphs: The secret of Google Search and now XDR
By removing the most common cause of traffic accidents – the human driver – autonomous vehicles are expected to reduce traffic accidents and fatalities. However, they may pose a completely different type of risk to drivers, passengers and pedestrians. …Read More Cybersecurity risks connected to AI in autonomous vehicles
Email data breaches are on the rise. Our recent research found that 93% of organizations have experienced an email data breach in the last 12 months, at an average rate of one incident every 12 working hours. The vast majority of these incidents are ca…Read More Why contextual machine learning is the fix that zero-trust email security needs