Please turn on your JavaScript for this page to function normally.

artificial intelligence

IoT
Preventing security issues from destroying the promise of IoT

Internet of Things (IoT) devices fall into various categories. Some, such as those located in a hospital setting, are very sophisticated, with advanced operating systems and …

cloud money
Cloud computing costs skyrocketing as businesses support a remote workforce

Anodot announced the results of a survey that reveals how organizations struggle to control skyrocketing cloud computing costs of the remote workforce, even as business moves …

AI
For CISOs and artificial intelligence to evolve, trust is a must

Artificial Intelligence (AI) is no longer the future – it is already in use in our homes, cars, and, often, our pockets. As the technology continues to expand its role …

AI
AI-based diagnostic processes that safeguard data privacy

Digital medicine is opening up entirely new possibilities. For example, it can detect tumors at an early stage. But the effectiveness of new AI algorithms depends on the …

brain
How do we decide whether or not to trust AI systems?

Every time you speak to a virtual assistant on your smartphone, you are talking to an artificial intelligence — an AI that can, for example, learn your taste in music and make …

online marketplace
How data manipulation could be used to trick fraud detection algorithms on e-commerce sites

As the marketing of almost every advanced cybersecurity product will tell you, artificial intelligence is already being used in many products and services that secure …

building
How willing are enterprise leaders to use top emerging technologies?

Emerging technologies can bring the potential for increased efficiencies, cost savings and improved security for enterprises, among other benefits—but also risk that must be …

cloud binary
Businesses embracing cloud more than ever

Organizations are accelerating their cloud journey to take advantage of its flexibility, control costs, speed time-to-market, and simplify data management, according to …

encryption
Researchers design a way to make encrypted keys harder to crack

As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits …

biometrics
Scammers aren’t always who we expect them to be: How AI and biometrics can help

When it’s time to hire a new employee, organizations go to great lengths to avoid hiring someone who would commit fraud: background checks, credit checks, drug tests, etc. But …

biometrics
DefakeHop: A deepfake detection method that tackles adversarial threat detection and recognition

Army researchers developed a deepfake detection method that will allow for the creation of state-of-the-art soldier technology to support mission-essential tasks such as …

Kubernetes
Kubernetes adoption continues to grow

Portworx released findings from its survey which assesses the mass adoption and evolution of Kubernetes usage among enterprise users in the last 12 months, in addition to the …

Don't miss

Cybersecurity news