• News
  • Features
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine
  • Twitter
(IN)SECUREMagazine
 

Featured news

  • Three reasons employee monitoring software is making a comeback
  • Machine learning fundamentals: What cybersecurity professionals need to know
  • Azure AD Identity Protection now revolves around risky users and risky sign-ins
  • Mozilla will use AI coding assistant to preemptively catch Firefox bugs
  • SaaS spending increasing by 78 percent year-over-year
  • How organizations handle disruptive data sources
  • Bank of Valletta suspended all operations in wake of cyber attack
  • Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
  • Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats
  • Most wanted malware in January 2019: A new threat speaks up
  • NIST Cybersecurity Framework: Five years later
  • Snapd flaw gives attackers root access on Linux systems

artificial intelligence

Get our Top Stories to your inbox
brain

Most organizations investing in AI, very few succeeding

  • July 27, 2018
  • artificial intelligence
  • Databricks

Today, only one in three AI projects are succeeding, and, perhaps more importantly, it is taking businesses more than six months to go from concept to production, according to …

quantum

Quantum computing revenue to hit $15 billion in 2028 due to AI, R&D, cybersecurity

  • July 24, 2018
  • ABI Research
  • artificial intelligence
  • cybersecurity

Total revenue generated from quantum computing services will exceed $15 billion by 2028, forecasts ABI Research. The demand for quantum computing services will be driven by …

zero

Businesses should embrace AI or face stagnation

  • June 8, 2018
  • artificial intelligence
  • GlobalData

If companies fail to make artificial intelligence (AI) a core competency within the next five years, they will face either stagnation or elimination. Recent GlobalData …

key

Why creativity is key to security

  • June 7, 2018
  • artificial intelligence
  • CISO
  • cybersecurity

Similar to corporate auditors and risk and compliance managers, security teams are often viewed as a hindrance to business growth. They are deemed the killjoys of business …

airport security

Airports develop digital transformation roadmaps with biometrics and blockchain

  • June 4, 2018
  • artificial intelligence
  • biometrics
  • blockchain

Increased passenger traffic and global capacity constraints will drive airport IT spending to $4.63 billion by 2023, according to Frost & Sullivan. Airports are …

people

Do young people hold the key to closing the cybersecurity talent gap?

  • May 10, 2018
  • artificial intelligence
  • cybersecurity
  • ESG

The cybersecurity talent shortage is a frequently talked about. Even with the attention, the future still holds more job openings than qualified employees available to fill …

lights

Leveraging security analytics to investigate and hunt modern threats

  • May 7, 2018
  • artificial intelligence
  • Awake Security
  • CISO

In this interview, Gary Golomb, co-founder at Awake Security, talks about how machine learning help develop a scalable enterprise cybersecurity plan, what technologies can …

brain

Global AI business value to reach $1.2 trillion in 2018

  • April 26, 2018
  • artificial intelligence
  • Gartner
  • High-Tech Bridge

Global business value derived from artificial intelligence (AI) is projected to total $1.2 trillion in 2018, an increase of 70 percent from 2017, according to Gartner. …

artificial intelligence

Open-source library for improving security of AI systems

  • April 18, 2018
  • artificial intelligence
  • IBM
  • open source

IBM researchers have created the Adversarial Robustness Toolbox, an open-source library to help researchers improve the defenses of real-world AI systems. Attacks against …

brain

AI deployments to drive investments in storage, networking, and cloud infrastructure

  • March 21, 2018
  • artificial intelligence
  • survey

The race for making perfect hardware to accelerate artificial intelligence (AI) applications is heating up and many companies are jumping in with their products and solutions. …

Posts navigation

Previous 1 2 3 4 5 6 7 8 Next
bot

Machine learning fundamentals: What cybersecurity professionals need to know

  • Azure AD Identity Protection now revolves around risky users and risky sign-ins
  • Bank of Valletta suspended all operations in wake of cyber attack
  • Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises
  • Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats
Spot
light
NIST Cybersecurity Framework: Five years later

What's New

Microsoft Azure

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Mozilla

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

puzzle

How organizations handle disruptive data sources

hand

Increased appetite for biometrics fueled by speed, security and convenience

business

SaaS spending increasing by 78 percent year-over-year

bot

Machine learning fundamentals: What cybersecurity professionals need to know

programmer

Three reasons employee monitoring software is making a comeback

vault

Bank of Valletta suspended all operations in wake of cyber attack

Don't miss

programmer

Three reasons employee monitoring software is making a comeback

bot

Machine learning fundamentals: What cybersecurity professionals need to know

Microsoft Azure

Azure AD Identity Protection now revolves around risky users and risky sign-ins

Mozilla

Mozilla will use AI coding assistant to preemptively catch Firefox bugs

hand

Increased appetite for biometrics fueled by speed, security and convenience

vault

Bank of Valletta suspended all operations in wake of cyber attack

danger

Trickbot becomes one of the most dangerous pieces of modular malware hitting enterprises

fire

Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats

Linux

Snapd flaw gives attackers root access on Linux systems

patch

February 2019 Patch Tuesday: PrivExchange hole plugged

question

SMBs spending a day each week dealing with cybersecurity issues

users

Nearly two-thirds of organizations say tech skills gap is impacting IT audits

 
(IN)SECURE Magazine

Newsletters

Subscribe to get regular updates from Help Net Security. The weekly newsletter contains a selection of the best stories, while the daily newsletter highlights all the latest headlines!

  • Start
  • News
  • Malware
  • Articles
  • Reviews
  • Events
  • Copyright 1998-2019 by Help Net Security
  • Read our privacy policy
  • About us
  • Advertise
  • Design by FatDUX

  • News
  • Features
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine
  • Twitter

Copyright 1998-2019 by Help Net Security | Read our privacy policy | About us | Contact | Advertise

Design by FatDUX