Please turn on your JavaScript for this page to function normally.

artificial intelligence

encryption
Researchers design a way to make encrypted keys harder to crack

As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits …

biometrics
Scammers aren’t always who we expect them to be: How AI and biometrics can help

When it’s time to hire a new employee, organizations go to great lengths to avoid hiring someone who would commit fraud: background checks, credit checks, drug tests, etc. But …

biometrics
DefakeHop: A deepfake detection method that tackles adversarial threat detection and recognition

Army researchers developed a deepfake detection method that will allow for the creation of state-of-the-art soldier technology to support mission-essential tasks such as …

Kubernetes
Kubernetes adoption continues to grow

Portworx released findings from its survey which assesses the mass adoption and evolution of Kubernetes usage among enterprise users in the last 12 months, in addition to the …

brain
Counterfit: Open-source tool for testing the security of AI systems

After developing a tool for testing the security of its own AI systems and assessing them for vulnerabilities, Microsoft has decided to open-source it to help organizations …

Earth
AI can alter geospatial data to create deepfake geography

A fire in Central Park seems to appear as a smoke plume and a line of flames in a satellite image. Colorful lights on Diwali night in India, seen from space, seem to show …

AI
Trends in the evaluation and implementation of enterprise AI adoption

New O’Reilly research explores the techniques, tools, and practices enterprise organizations are using to better understand how artificial intelligence (AI) has evolved over …

people
A data-driven look at the key developments shaping the future of work

A recent CompTIA survey of HR professionals finds 67% report placing more emphasis on reskilling and upskilling efforts. For large organizations, the need is even more …

AI
AI industry alarmingly unprepared for real-world attacks

Adversa has published comprehensive research on the security and trustworthiness of AI systems worldwide during the last decade. The report reveals the most critical …

SASE
Transitioning to a SASE architecture

There are several key points when contemplating a change in your security architecture. First, and foremost, there is still a security perimeter. The perimeter, however, is …

identity
Number of users of software-based facial recognition for payments to surge

The number of users of software-based facial recognition to secure payments will exceed 1.4 billion globally by 2025, from just 671 million in 2020, a Juniper Research study …

Power
In the digital economy, computing power defines productivity

Global digital transformation has entered a phase marked by exponential growth in innovation, with the size of the digital economy projected to continue on an upward trend. As …

Don't miss

Cybersecurity news