Network security, Security, Tech
May 31, 2018
Via: Dark ReadingSecurity budgets are growing and so are security costs, with drivers coming from all sides: data breaches that are more frequent and more expensive to remediate; preventative technologies that are costly to buy and maintain; and talent that remains both […]
May 31, 2018
Via: Dark ReadingThe ability to learn gives security-focused AI and ML apps unrivaled speed and accuracy over their more basic, automated predecessors. But they are not a silver bullet. Yet. Machine learning (ML) and artificial intelligence (AI) are not what most people […]
Tech, Threats & Malware, Vulnerabilities
May 30, 2018
Via: Help Net SecurityAs smart cities integrate connected technologies to operate more efficiently and improve the quality of city services, new vulnerabilities arise that require diligent governance of municipal technology. Global ISACA survey respondents flag the energy sector to be the critical infrastructure system most […]
Network security, Security, Tech
May 29, 2018
Via: Dark ReadingEveryone with a home router should reboot their systems as a precaution in the wake of the recently discovered VPNFilter attack infrastructure. The FBI is widening its guidance on who should reboot a SOHO router in response to the VPNFilter attack that […]
Network security, Security, Tech
May 29, 2018
Via: The HillA growing number of Democratic lawmakers and civil libertarians are voicing concerns about Amazon’s facial recognition software, worrying that it could be misused. They fear that without proper oversight the technology could hurt minority or poor communities and allow police to […]
Cyber warfare, Cyber-crime, Security, Tech
February 14, 2018
Via: Naked SecurityThe UK Home Office on Monday unveiled a £600,000 artificial intelligence (AI) tool to automatically detect terrorist content. The Home Office cited tests that show the new tool can automatically detect 94% of Daesh propaganda with 99.995% accuracy. That accuracy […]
Hacker, Privacy protection, Security, Tech
February 14, 2018
Via: We Live SecurityThe times when all that our TV sets could do was show us ‘regular’ TV stations are now over. These days, such ‘old-school’ television sets are increasingly being replaced with their ‘smart’ successors, which we can use for streaming video […]
Privacy protection, Security, Tech
February 14, 2018
Via: We Live SecurityRegardless of your favorite or most hated device due to security concerns, the technologists behind them and the software they use, should share a key concern: “Security by design (and by default)”. While a strong line of prose, Security by […]
Network security, Security, Tech
December 19, 2017
Via: Security IntelligenceSecurity conferences offer great opportunities to learn about the latest innovations and trends in the industry. They allow practitioners to interact directly with vendors and to network with their peers, putting a human spin on the technology-driven, often impersonal business […]
December 15, 2017
Via: CIODigital disruption hasn’t reached its zenith, leaving many CEOs still desperate to learn how to get ahead of it. Fear not: PwC principal Tom Puthiyamadam is on a mission to save corporate C-suites from themselves. Some CEOs are embarking on […]
December 14, 2017
Via: Help Net SecurityReliability, security and quality of service all rank above cost when evaluating networking solutions providers. Spiceworks surveyed U.S.-based IT professionals who have influence on their organizations’ Ethernet, MPLS and SD-WAN purchase decisions. The survey gathered data around the challenges, benefits […]
September 18, 2017
Via: Help Net SecurityThe technology industry has always had a big problem with hype, with marketing teams, analysts and the media alike tending to fixate on the next big thing that will revolutionise our lives. Artificial intelligence is the latest technology to be […]
September 13, 2017
Via: Security WeekThe United States Department of Energy announced on Tuesday its intention to invest up to $50 million in the research and development of tools and technologies that would make the country’s energy infrastructure more resilient and secure. Over $20 million […]
September 12, 2017
Via: CSO OnlineRead a security related press release or been to an event recently? You’ve no doubt been wondering how you managed to do your job all this time without Artificial Intelligence (AI) or Machine Learning (ML).Do these technologies really live up […]
September 12, 2017
Via: Naked SecurityApple has long been either a privacy hero or headache, depending on which side of the divide you sit. And based on the beta versions of iOS11, which gets its grand, official introduction on Tuesday at the Apple Special Event, […]
September 8, 2017
Via: CIOMachine learning is transforming business. But even as the technology advances, companies still struggle to take advantage of it, largely because they don’t understand how to strategically implement machine learning in service of business goals. Hype hasn’t helped, sowing confusion […]
September 6, 2017
Via: Security IntelligenceIt’s hard to escape the reality that every day, cyberthreats morph and expand, escalating the need to improve and tighten security operations and response practices. While it may feel overwhelming, there are ways to help level the playing field. Cognitive […]
January 7, 2015
Via: featured#apple’s 12-inch #macbook air has been rumored for a while now, but the computer is very real, according to a new report from 9to5Mac’s Mark Gurman. The resourceful and consistently accurate site has revealed specs and renders of a 12-inch […]
July 8, 2014
Via: featuredFeatured in Discover Magazines recent 10 Geeky Gifts Inspired by Science Guide, this delightful charger resembles a human umbilical cord. The Grow Cable was created by artist Iizawa Mio, as a statement about the human attachment to technology. This is […]
February 15, 2013
Via: featuredMobile technology is developing so fast. Smartphone and tablet are a few mobile technologies that reach the height of glory. But the power of Smartphone and tablet is not just located at the hardware. The impressive thing from these technologies […]