machine learning
Current methods for anonymizing data leave individuals at risk of being re-identified
With the first large fines for breaching GDPR upon us, even anonymized datasets can be traced back to individuals using machine learning, researchers from University of …
Avoiding a biometric dystopia
In part one of our two-part series, we explored how biometric authentication methods are being defeated. In the second part, we’ll explore how manipulating biometrics can …
Beating biometrics: Why biometric authentication alone is not a panacea
As we witness the accelerating use of biometrics throughout our lives, we must pause to consider the risks and ramifications of doing so as technological advancements make it …
Researchers develop a technique to vaccinate algorithms against adversarial attacks
A set of techniques to effectively vaccinate algorithms against adversarial attacks have been developed by researchers from CSIRO’s Data61. Algorithms …
How can organizations leverage AI technologies to achieve project success?
AI disruption is happening and at a large scale: 81 percent of project professionals report their organization is being impacted by AI technologies; 37 percent say adopting AI …
Volume and quality of training data are the largest barriers to applying machine learning
IDC predicts worldwide spending on artificial intelligence (AI) systems will reach $35.8 billion in 2019, and 84% of enterprises believe investing in AI will lead to greater …
When all else fails, organizations realize they must share threat intel
A large majority of security IT decision makers are ready and willing to share valuable threat intelligence data to help the collective industry make better, more informed …
While data enables innovation, its vulnerability continues to cause anxiety among IT leaders
Today’s technology landscape demands that companies determine how to manage and secure data in a connected ecosystem, as well as embrace it to create competitive advantages. …
C-Suite execs and policy makers find cybersecurity technology investments essential
The majority of C-Suite executives and policy makers in the United States believe investing in security software, infrastructure and emerging technologies is critical to …
Legacy infrastructures and unmanaged devices top security risks in the healthcare industry
The proliferation of healthcare IoT devices, along with unpartitioned networks, insufficient access controls and the reliance on legacy systems, has exposed a vulnerable …
Closed loop automation combats IoT security threats in the 5G age
The 5G race is on as carriers prepare for the onset of the next wireless generation in their own ways. While some have pseudo-definitions of 5G, others like Verizon and …
Organizations investing in security analytics and machine learning to tackle cyberthreats
IT security’s greatest inhibitor to success is contending with too much security data. To address this challenge, 47 percent of IT security professionals acknowledged their …
Featured news
Sponsored
Don't miss
- Cultivating a security-first mindset: Key leadership actions
- Microsoft patches two zero-days exploited in the wild (CVE-2024-43573, CVE-2024-43572)
- Ivanti fixes three CSA zero-days exploited in the wild (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381)
- Qualcomm zero-day under targeted exploitation (CVE-2024-43047)
- American Water shuts down systems after cyberattack