Source: infosecurity-magazine.com While global cybersecurity spending now surpasses $100 billion annually, 64 percent of enterprises were compromised in 2018, according to a study by the Ponemon Institute. What explains this less-than-impressive ROI? The standard answer is that wily cyber-criminals are employing ever-evolving, increasingly sophisticated attack methods, part of a never-ending game of cat-and-mouse in which they all too often Read More
Tag: cybersecurity
Upgrade & Secure Your Future with DevOps, SRE, DevSecOps, MLOps!
We spend hours on Instagram and YouTube and waste money on coffee and fast food, but won’t spend 30 minutes a day learning skills to boost our careers.
Master in DevOps, SRE, DevSecOps & MLOps!
Learn from Guru Rajesh Kumar and double your salary in just one year.

Source: top10pokersites.net A team of researchers from Facebook have recently developed a poker-playing AI that is capable of beating human players in heads-up, no-limit Texas hold’em poker. Called Recursive Belief-based Learning (ReBel), the general AI framework learns poker faster than any other previous poker-specific AI, using less domain knowledge, and researchers are claiming this with a supporting experiment. The Read More

Source: infosecurity-magazine.com/ Whether we realize it or not, our digital lives and what we see on the internet are controlled and determined by algorithms and analytics. Through them, businesses learn what our preferences are and what we’re drawn to in order to target us with information. The idea is to present us with information that Read More

Source: thefastmode.com Telefónica, through TIV (Telefónica Innovation Ventures), its corporate venture capital vehicle, has made an investment in Nozomi Networks, a leading OT and IoT security provider that operates in 16 countries. Nozomi Networks’ total funding to date exceeds $54M with top-tier investors including GGV Capital, Lux Capital, Energize Ventures and Planven Investments. This investment Read More

Source: securitybrief.eu Internet of Things connections are expected to exceed 23 billion across all major IoT markets by 2026, according to new figures from ABI Research. The analyst firm’s Device Authentication in IoT technology analysis report reveals almost all those connections will be faced with incessant and constantly evolving cyber-threats, forcing implementers and IoT vendors Read More

Source: nextgov.com Vendors of artificial intelligence technology should not be shielded by intellectual property claims and will have to disclose elements of their designs and be able to explain how their offering works in order to establish accountability, according to a leading official from the Cybersecurity and Infrastructure Security Agency. “I don’t know how you Read More

Source: tripwire.com The Internet of Things (IoT) is growing in technical, social, and economic significance. ENISA defines the increasingly complex IoT systems as “cyber-physical ecosystem[s] of interconnected sensors and actuators, which enables intelligent decision making.” These technologies collect, exchange and process data in order to dynamically adapt to a specific context, transforming businesses and the way we Read More

Source: etsi.org The ETSI Technical Committee on Cybersecurity (TC CYBER) today unveils ETSI EN 303 645, a standard for cybersecurity in the Internet of Things that establishes a security baseline for internet-connected consumer products and provides a basis for future IoT certification schemes. Based on the ETSI specification TS 103 645, EN 303 645 went through National Read More

Source: lawfareblog.com The “internet of things” (IoT) has been insecure since the first connected refrigerator woke up and asked for more milk. But while having your fridge hacked seems at best amusing and at worst inconvenient, the nightmare scenario is a matter of national security. Imagine hundreds of thousands of smart refrigerators, all with the Read More

Source: telecom.economictimes.indiatimes.com San Francisco: Security researchers have discovered serious vulnerabilities that could expose millions of Internet of Things (IoT) devices worldwide to hackers. The list of affected vendors includes HP, Schneider Electric, Intel, Rockwell Automation, Caterpillar and Baxter. According to JSOF, a boutique cybersecurity organization, the vulnerabilities dubbed ‘Ripple20’ relate to the Treck TCP/IP stack, a TCP/IP protocol suite designed for embedded systems. Read More

Source: news.psu.edu UNIVERSITY PARK, Pa. — The risks and costs associated with cybercrime, cyberterrorism and cyberwarfare continue to increase rapidly around the world. These challenges become more complex when placed in the context of international issues that threaten economic, political and physical welfare. A new residential master of science degree in cybersecurity analytics and operations from Penn State’s College of Information Sciences and Technology is designed to help meet the growing Read More

Source: cxotoday.com In the fight against COVID-19, technology innovations are steadily making a difference to healthcare systems. The pace of innovation in Internet of Things (IoT) systems, in particular, to track infections, people movement, detect potential carriers, and remotely monitor health conditions are now being used and developed all over the world. However, the use Read More

Source: cyberscoop.com Public and private sector enterprises need to consider expanding their use of AI-augmented cybersecurity tools to better defend their networks and assets, say experts in a new podcast. As the range of cyberthreats continues to expand, and organizations remain hard-pressed to hire enough talent to keep up, cyber experts recommend that executives explore Read More

Source: techxplore.com A classification algorithm for relational data that is more accurate, as well as orders of magnitude more efficient than previous schemes, has been developed through a research collaboration between KAUST and Nortonlifelock Research Group in France. The new algorithm, which uses an approach called reinforcement learning, demonstrates the power of machining learning techniques in Read More

Source: darkreading.com If you believed everything you read, artificial intelligence (AI) is the savior of cybersecurity. According to Capgemini, 80% of companies are counting on AI to help identify threats and thwart attacks. That’s a big ask to live up to because, in reality, few nonexperts really understand the value of AI to security or whether Read More

Source: hrnews.co.uk Malware, phishing and ransomware are constantly keeping security teams on their toes. But there is one risk to data security that cannot be stopped by cybersecurity software: human error. Unlike malicious threat actors, human error doesn’t come and go as trends in the cyber landscape change. It is true of data breaches throughout Read More
Source: forbesindia.com In the current scenario, COVID-19 doesn’t seem to have an end as this virus does not discriminate based on caste and creed. This pandemic situation has brought the world to a standstill and forced the plans of every individual to be rethought in a different dimension altogether concerning the new economic crisis that Read More
Source: technative.io While malicious or criminal attacks can be combatted by state-of-the-art cybersecurity software, and while you can prepare for IT failures with a diligent backup strategy, human error is still in need of a remedy. Humans are naturally prone to making mistakes. Such errors are increasingly impactful in the workplace, but human error in Read More

Source: informationweek.com The growth of machine learning and its ability to provide deep insights using big data continues to be a hot topic. Many C-level executives are developing deliberate ML initiatives to see how their companies can benefit, and cybersecurity is no exception. Most information security vendors have adopted some form of ML, however it’s Read More

Source: gcn.com The cybersecurity skills shortage continues to plague organizations across regions, markets and sectors, and the government sector is no exception. According to (ISC)2, there are only enough cybersecurity pros to fill about 60% of the jobs that are currently open — which means the workforce will need to grow by roughly 145% to just meet the Read More

Source: gritdaily.com We all know the feeling: you spot a link to “unbelievably rare historical photos – in color!” or a video of the “cutest puppies in the world!” and you helplessly move your cursor toward it. The site may look a little suspicious, but you’re an amateur historian – or maybe you just really Read More

Source: virtualizationreview.com The COVID-19 pandemic has shifted the top concerns of enterprise CIOs, who are now prioritizing their spending on areas such as cybersecurity, public cloud, infrastructure and AI/ML. That’s according to a new survey from Adobe, who teamed up with Fortune to measure “How A Remote Workforce Is Shifting CIO Priorities.” “Amid the uncertainty of COVID-19, Read More

Source: securityintelligence.com Technologies like artificial intelligence (AI) and neural networks are driven by deep learning — machine learning algorithms that get “smarter” with more data. The deepfake, a severe cybersecurity threat, wouldn’t be possible without deep learning. Deepfakes aside, we need to be aware that several machine learning models, including state-of-the-art neural networks, are vulnerable to Read More

Source: helpnetsecurity.com Python backdoor attacks are increasingly common. Iran, for example, used a MechaFlounder Python backdoor attack against Turkey last year. Scripting attacks are nearly as common as malware-based attacks in the United States and, according to the most recent Crowdstrike Global Threat Report, scripting is the most common attack vector in the EMEA region. Python’s Read More

Source: incyberdefense.com Bottom Line: Phishing is the leading cause of all breaches, succeeding because impersonation, redirection, and social engineering methods are always improving. And, phishing is only one way emails are used in fraud. Businesses need to understand if an email address can be trusted before moving forward with a transaction. Microsoft thwarts billions of phishing Read More

Source: finance.yahoo.com The survey, performed at RSA Conference 2020, reflects the need for security organizations to incorporate both AI and human element offerings WhiteHat Security, an independent subsidiary of NTT Ltd. and a leading application security provider, today released the results of its “AI and Human Element Security Sentiment Study,” based on a survey of Read More

Source: venturebeat.com Cybersecurity has always focused on essentially protecting the machine layer. This started with protecting networks using firewalls and then devices using endpoint detection systems. But data breaches and cybersecurity events are still on the rise, and exponentially growing. “We believe this is because there’s essentially a person behind every data breach, and it’s Read More

Source: containerjournal.com A platform for automating the protection containers from SentinelOne is now generally available. Fresh off raising an additional $200 million in funding, SentinelOne developed its Singularity platform to identify which communications between services should be whitelisted between endpoints and then identify and block any anomalous behavior. That approach allows SentinelOne to track, among other Read More

Source: analyticsinsight.net The widespread shortage of talented security operations and threat intelligence resources in security operations centers (SOCs) leaves numerous companies open to the increased danger of a security incident. That is on the grounds that they can’t adequately explore all discovered, possibly vindictive practices in their environment in an intensive and repeatable way. While Read More

Source: unite.ai A group of computer scientists at the University of Texas at Dallas have developed a new approach for defending against cybersecurity. Rather than blocking hackers, they entice them in. The newly developed method is called DEEP-Dig (DEcEPtion DIGging), and it entices hackers into a decoy site so that the computer can learn their tactics. The Read More