machine learning
Does analyzing employee emails run afoul of the GDPR?
A desire to remain compliant with the European Union’s General Data Protection Regulation (GDPR) and other privacy laws has made HR leaders wary of any new technology that …
OPTIMUSCLOUD: Cost and performance efficiency for cloud-hosted databases
A Purdue University data science and machine learning innovator wants to help organizations and users get the most for their money when it comes to cloud-based databases. Her …
Increased attacks and the power of a fully staffed cybersecurity team
The cybersecurity landscape is constantly evolving, and even more so during this time of disruption. According to ISACA’s survey, most respondents believe that their …
A math formula could help 5G networks efficiently share communications frequencies
Researchers at the National Institute of Standards and Technology (NIST) have developed a mathematical formula that, computer simulations suggest, could help 5G and other …
Open source algorithms for network graph analysis help discover patterns in data
StellarGraph has launched a series of new algorithms for network graph analysis to help discover patterns in data, work with larger data sets and speed up performance while …
What is the impact of AI and ML tools on cybersecurity?
89% of IT professionals believe their company could be doing more to defend against cyberattacks, with 64% admitting they are not sure what AI/ML means – despite increased …
Researchers develop self-healing and self-concealing PUF for hardware security
A team of researchers from the National University of Singapore (NUS) has developed a novel technique that allows Physically Unclonable Functions (PUFs) to produce more …
Threat detection and the evolution of AI-powered security solutions
Ashvin Kamaraju is a true industry leader. As CTO and VP of Engineering, he drives the technology strategy for Thales Cloud Protection & Licensing, leading a researchers …
AI efforts are maturing from prototype to production, but obstacles remain
More than half of enterprises are in the “mature” phase of AI adoption – defined by those currently using AI for analysis or in production – while about one third are …
The human element in security is still needed to combat application vulnerabilities
While over half of organizations use artificial intelligence or machine learning in their security stack, nearly 60 percent are still more confident in cyberthreat findings …
Researchers design a tool to identify the source of errors caused by software updates
We’ve all shared the frustration when it comes to errors – software updates that are intended to make our applications run faster inadvertently end up doing just …
There is no easy fix to AI privacy problems
Artificial intelligence – more specifically, the machine learning (ML) subset of AI – has a number of privacy problems. Not only does ML require vast amounts of data for …
Featured news
Sponsored
Don't miss
- How open-source MDM solutions simplify cross-platform device management
- Google on scaling differential privacy across nearly three billion devices
- Lottie Player supply chain compromise: Sites, apps showing crypto scam pop-ups
- North Korean hackers pave the way for Play ransomware
- IoT needs more respect for its consumers, creations, and itself