Please turn on your JavaScript for this page to function normally.
data
IT decision-makers doubt current data architectures will meet future model inferencing requirements

As companies look to expand their use of artificial intelligence (AI) and machine learning (ML) to keep up with the demands of their customers, they are facing hurdles getting …

stock price
Middle East ICT market expected to reach $95.05 billion by 2025

With the emphasis on reducing dependency on the oil industry, several Middle Eastern countries are formulating strategies to boost the contribution of the Information and …

brain
Secure AI is the foundation of trustworthy AI

AI-based recommendation systems are used in many online services we enjoy today, including search engines, online shopping sites, streaming services, and social media. …

SecOps
The impact of current and emerging threats on the day-to-day lives of SecOps teams

More than half of IT and cybersecurity professionals noted ransomware or zero-day attacks as the biggest threats to their organization, according to a Deep Instinct survey. …

bomb
Malicious COVID-19 online content bypassing moderation efforts of social media platforms

Malicious COVID-19 online content – including racist content, disinformation and misinformation – thrives and spreads online by bypassing the moderation efforts of …

cloud money
Cloud computing costs skyrocketing as businesses support a remote workforce

Anodot announced the results of a survey that reveals how organizations struggle to control skyrocketing cloud computing costs of the remote workforce, even as business moves …

secure
Are your cyber defenses stuck in the sandbox?

Installing a network sandbox to safeguard against external threats has been accepted by many as the gold standard for more than a decade. Sandbox-based cybersecurity solutions …

online marketplace
How data manipulation could be used to trick fraud detection algorithms on e-commerce sites

As the marketing of almost every advanced cybersecurity product will tell you, artificial intelligence is already being used in many products and services that secure …

cloud binary
Businesses embracing cloud more than ever

Organizations are accelerating their cloud journey to take advantage of its flexibility, control costs, speed time-to-market, and simplify data management, according to …

encryption
Researchers design a way to make encrypted keys harder to crack

As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits …

brain
Counterfit: Open-source tool for testing the security of AI systems

After developing a tool for testing the security of its own AI systems and assessing them for vulnerabilities, Microsoft has decided to open-source it to help organizations …

AI
AI industry alarmingly unprepared for real-world attacks

Adversa has published comprehensive research on the security and trustworthiness of AI systems worldwide during the last decade. The report reveals the most critical …

Don't miss

Cybersecurity news