Source – https://www.datanami.com/ Thanks to the exponential growth of malware, traditional heuristics-based detection regimes have been overwhelmed, leaving computers at risk. Machine learning approaches can help, but the bottleneck presented by the feature engineering step is a potential dealbreaker. The best path forward at this point is deep learning, says the CEO of Deep Instinct, Read More
Tag: cybersecurity
Source – https://venturebeat.com/ Before diving into cybersecurity and how the industry is using AI at this point, let’s define the term AI first. Artificial intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including deep learning, and unsupervised), as well as other algorithmic approaches that are more than just simple Read More
Source – https://www.esecurityplanet.com/ There’s a never ending cycle between the measures cybersecurity providers introduce to prevent or remediate cyber threats and the tactics cyber criminals use to get around these security measures. As soon as a security company develops a way to mitigate the latest threat, attackers develop a new threat to take its place. Read More
Source – https://analyticsindiamag.com/ Defence Institute of Advanced Technology (DIAT), a deemed university and an autonomous organisation funded by the Defence PSU to offer two online courses– short term programme on Artificial Intelligence & Machine Learning and online training and certification course on cybersecurity Defence Research and Development Organization (DRDO) has announced two online courses– short Read More
Source: zdnet.com The possibilities opened up to us by the rise of the Internet of Things (IoT) is a beautiful thing. However, not enough attention is being paid to the software that goes into the things of IoT. This can be a daunting challenge, since, unlike centralized IT infrastructure, there are, by one estimate, at Read More
Source: securityboulevard.com In September, the House of Representatives passed a bill requiring that all internet of things (IoT) devices purchased by the government meet minimum security requirements. Of course, with everything being connected to everything, there needs to be a step function improvement in the security of the networks being used to share information. I Read More
Source: techrepublic.com Three cybersecurity experts explained how artificial intelligence and machine learning can be used to evade cybersecurity defenses and make breaches faster and more efficient during a NCSA and Nasdaq cybersecurity summit. Kevin Coleman, the executive director of the National Cyber Security Alliance, hosted the conversation as part of Usable Security: Effecting and Measuring Read More
Source: newindianexpress.com CHENNAI: Tamil Nadu will be offering insights into its initiatives in Artificial Intelligence (AI) on Friday during the global virtual summit on Responsible AI for Social Empowerment or RAISE 2020 in New Delhi. Santosh Mishra, Chief Executive Officer of the Tamil Nadu e-Governance Agency (TNeGA), told The New Indian Express that only Tamil Read More
Source: dcvelocity.com If you’ve been paying attention to cybersecurity news this past year, then you already know. All of them have experienced truly staggering data breaches in 2020. Hackers have learned to deploy every technology and trick up their sleeves to steal data, cause disruption, and exploit the billions of people out there just trying Read More
Source:-expresscomputer Emerging technologies have been dominating the corporate world, even before the pandemic. But the pandemic caused by the novel coronavirus brought about a massive disruption across industries, forcing even those who were far behind in terms of technology to jump on the bandwagon and digitize their operations in order to survive the crisis. The Read More
Source:-scientect Global Artificial Intelligence (AI) in Cybersecurity Market in-depth insights which includes the competitiveness of the trending players. this market report provides a basic overview of the industry including definitions, classifications, applications and chain structure. Analysts have carefully evaluated the milestones achieved by the Artificial Intelligence (AI) in Cybersecurity Market and the current trends that Read More
Source: expresscomputer.in Prime Minister Narendra Modi on Saturday reiterated that the government will soon unveil a new cybersecurity policy. During his speech from the Red Fort on the 74th Independence Day, Modi said that India is alert, cautious and is taking decisions to counter cyber threats and is constantly developing new systems. The draft of Read More
Source: techhq.com The pandemic has repeatedly reaffirmed our needs for robots. The time has come for industrial robots to take over factory floors and showcase the suite of benefits they bring to manufacturing. Robots are generally known to automate repetitive tasks and free up valuable time for their human colleagues to take on more complex Read More
Source: helpnetsecurity.com Instead of relying on customers to protect their vulnerable smart home devices from being used in cyberattacks, Ben-Gurion University of the Negev (BGU) and National University of Singapore (NUS) researchers have developed a new method that enables telecommunications and internet service providers to monitor these devices. According to their new study, the ability Read More
Source: infosecurity-magazine.com While global cybersecurity spending now surpasses $100 billion annually, 64 percent of enterprises were compromised in 2018, according to a study by the Ponemon Institute. What explains this less-than-impressive ROI? The standard answer is that wily cyber-criminals are employing ever-evolving, increasingly sophisticated attack methods, part of a never-ending game of cat-and-mouse in which they all too often Read More
Source: top10pokersites.net A team of researchers from Facebook have recently developed a poker-playing AI that is capable of beating human players in heads-up, no-limit Texas hold’em poker. Called Recursive Belief-based Learning (ReBel), the general AI framework learns poker faster than any other previous poker-specific AI, using less domain knowledge, and researchers are claiming this with a supporting experiment. The Read More
Source: infosecurity-magazine.com/ Whether we realize it or not, our digital lives and what we see on the internet are controlled and determined by algorithms and analytics. Through them, businesses learn what our preferences are and what we’re drawn to in order to target us with information. The idea is to present us with information that Read More
Source: thefastmode.com Telefónica, through TIV (Telefónica Innovation Ventures), its corporate venture capital vehicle, has made an investment in Nozomi Networks, a leading OT and IoT security provider that operates in 16 countries. Nozomi Networks’ total funding to date exceeds $54M with top-tier investors including GGV Capital, Lux Capital, Energize Ventures and Planven Investments. This investment Read More
Source: securitybrief.eu Internet of Things connections are expected to exceed 23 billion across all major IoT markets by 2026, according to new figures from ABI Research. The analyst firm’s Device Authentication in IoT technology analysis report reveals almost all those connections will be faced with incessant and constantly evolving cyber-threats, forcing implementers and IoT vendors Read More
Source: nextgov.com Vendors of artificial intelligence technology should not be shielded by intellectual property claims and will have to disclose elements of their designs and be able to explain how their offering works in order to establish accountability, according to a leading official from the Cybersecurity and Infrastructure Security Agency. “I don’t know how you Read More
Source: tripwire.com The Internet of Things (IoT) is growing in technical, social, and economic significance. ENISA defines the increasingly complex IoT systems as “cyber-physical ecosystem[s] of interconnected sensors and actuators, which enables intelligent decision making.” These technologies collect, exchange and process data in order to dynamically adapt to a specific context, transforming businesses and the way we Read More
Source: etsi.org The ETSI Technical Committee on Cybersecurity (TC CYBER) today unveils ETSI EN 303 645, a standard for cybersecurity in the Internet of Things that establishes a security baseline for internet-connected consumer products and provides a basis for future IoT certification schemes. Based on the ETSI specification TS 103 645, EN 303 645 went through National Read More
Source: lawfareblog.com The “internet of things” (IoT) has been insecure since the first connected refrigerator woke up and asked for more milk. But while having your fridge hacked seems at best amusing and at worst inconvenient, the nightmare scenario is a matter of national security. Imagine hundreds of thousands of smart refrigerators, all with the Read More
Source: telecom.economictimes.indiatimes.com San Francisco: Security researchers have discovered serious vulnerabilities that could expose millions of Internet of Things (IoT) devices worldwide to hackers. The list of affected vendors includes HP, Schneider Electric, Intel, Rockwell Automation, Caterpillar and Baxter. According to JSOF, a boutique cybersecurity organization, the vulnerabilities dubbed ‘Ripple20’ relate to the Treck TCP/IP stack, a TCP/IP protocol suite designed for embedded systems. Read More
Source: news.psu.edu UNIVERSITY PARK, Pa. — The risks and costs associated with cybercrime, cyberterrorism and cyberwarfare continue to increase rapidly around the world. These challenges become more complex when placed in the context of international issues that threaten economic, political and physical welfare. A new residential master of science degree in cybersecurity analytics and operations from Penn State’s College of Information Sciences and Technology is designed to help meet the growing Read More
Source: cxotoday.com In the fight against COVID-19, technology innovations are steadily making a difference to healthcare systems. The pace of innovation in Internet of Things (IoT) systems, in particular, to track infections, people movement, detect potential carriers, and remotely monitor health conditions are now being used and developed all over the world. However, the use Read More
Source: cyberscoop.com Public and private sector enterprises need to consider expanding their use of AI-augmented cybersecurity tools to better defend their networks and assets, say experts in a new podcast. As the range of cyberthreats continues to expand, and organizations remain hard-pressed to hire enough talent to keep up, cyber experts recommend that executives explore Read More
Source: techxplore.com A classification algorithm for relational data that is more accurate, as well as orders of magnitude more efficient than previous schemes, has been developed through a research collaboration between KAUST and Nortonlifelock Research Group in France. The new algorithm, which uses an approach called reinforcement learning, demonstrates the power of machining learning techniques in Read More
Source: darkreading.com If you believed everything you read, artificial intelligence (AI) is the savior of cybersecurity. According to Capgemini, 80% of companies are counting on AI to help identify threats and thwart attacks. That’s a big ask to live up to because, in reality, few nonexperts really understand the value of AI to security or whether Read More
Source: hrnews.co.uk Malware, phishing and ransomware are constantly keeping security teams on their toes. But there is one risk to data security that cannot be stopped by cybersecurity software: human error. Unlike malicious threat actors, human error doesn’t come and go as trends in the cyber landscape change. It is true of data breaches throughout Read More