Source: newdelhitimes.com The term Artificial Intelligence (AI) was coined by John McCarthy in 1956. AI is defined in the Oxford English Dictionary as “the theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.” According to techopedia.com, Artificial Intelligence (AI) Read More
Tag: Security
Source: aithority.com Artificial Intelligence (AI) is creating a new frontline in information security. Systems that independently learn, reason and act will increasingly replicate human behavior. Like humans, they will be flawed, but also capable of achieving great things. AI poses new information risks and makes some existing ones more dangerous. However, it can also be used for Read More
Source: containerjournal.com McAfee announced today it has added a container security module to McAfee MVISION Cloud following its acquisition last August of NanoSec, a provider of a set of tools for segmenting network traffic between containers. John Dodds, director of product for McAfee, says McAfee MVISION Cloud for Containers combines the “nano segmentation” overlays created Read More
Source: helpnetsecurity.com Signal Sciences, the fastest growing web application security company in the world, announced the general availability of the first application protection solution for Istio, the industry-leading open source service mesh for microservices architecture (MSA) applications. Signal Sciences continues to offer the first and only next-gen web application firewall (WAF) and runtime application self-protection Read More
Source: techradar.com At the big AWS re: Invent 2019 conference, Amazon has revealed a new security tool for customers using its S3 cloud storage service, to help ensure that data put in the cloud, stays in the cloud, and isn’t leaked elsewhere by accident. The utility, called Access Analyzer, is for S3 (Amazon’s Simple Storage Service) and Read More
Source: informationweek.com There are a growing number of data collaboration solution providers competing to solve the IT management challenges of enterprise data fragmentation. This is the problem where siloed teams all want to work on large data sets, including data from other teams, and so copies of the data are made and shared, resulting in Read More
Source: cxotoday.com As enterprises look to become more Agile and move towards a DevOps and continuous testing, the need for microservices has grown manifolds. Businesses require a next-generation web application firewall (WAF) that enables secure delivery of applications. Software development life cycle (SDLC), is as flexible as the dynamic environment and threat landscape and adapts Read More
Advanced artificial intelligence will evolve shifting the traditional advantage of the cybercriminal
Source: dqindia.com Fortinet unveiled predictions from the FortiGuard Labs team about the threat landscape for 2020 and beyond. These predictions reveal methods that Fortinet anticipates cybercriminals will employ in the near future, along with important strategies that will help organizations protect against these oncoming attacks. Michael Joseph, director system engineering, India & SAARC, Fortinet, said: Read More
Source: itproportal.com Businesses today continue to be bombarded by an increasing number of cyberthreats, as hackers become adept at identifying and exploiting vulnerabilities in security systems. A survey by the World Economic Forum ranked data theft and large-scale cyberattacks 4th and 5th in a list of the biggest risks facing our world. With cybercrime regularly Read More
Source: itproportal.com The insights gained from Big Data analytics can be incredibly valuable to a business. Yet, every new data stream creates a new potential attack vector, making classic perimeter defences obsolete and leaving the organisation vulnerable. In the past, data security executives and data scientists had to choose between analytics and security but now Read More
Source: darkreading.com In the hands of enthusiastic marketing departments, the terms “artificial intelligence,” “machine learning,” and “deep learning” have become fuzzy in definition, sacrificing clarity to the need for increasing sales. It’s entirely possible that you’ll run into a product or service that carries one (or several) of these labels while carrying few of its Read More
Source: darkreading.com Cloud-native architectures help businesses reduce application development time and increase agility, at a lower cost. Although flexibility and portability are key drivers for adoption, a cloud-native structure brings with it a new challenge: managing security and performance at scale. Challenges in the CloudThe nature of containers and microservices makes it harder to protect Read More
Source:- thestar.com.my Microsoft Corp has what may sound like a counter-intuitive request: Please try to hack into Azure more often. The company isn’t encouraging malicious attacks but it does want security researchers to spend more time poking holes in its flagship cloud service so the company can learn about flaws and fix them. Many so-called White Read More
Source- searchnetworking.techtarget.com Machine learning is a branch of artificial intelligence that focuses on getting a computer to figure out how to solve a problem, instead of humans telling it how to do so. In the case of networking, machine learning can be used to improve analytics, management and security. But, to fully understand how machine learning Read More
Source-railway-technology.com Engineering and design company Klas Telecom is to launch a new deep learning computer vision solution for the railway industry. The solution is due to be launched next week at the InnoTrans 2018 event in Germany. Alongside providing deep learning computer vision, the solution will offer object detection capabilities to trains and the network Read More
Source-businesstoday.in Blowing the lid off what could possibly be one of the biggest data breaches of unique identity database of over a billion Indians, a report by Huffpost on Tuesday claimed that UIDAI’ database has been compromised by a software patch that disables critical security features of the software used to enrol new Aadhaar users. Read More
Source – csoonline.com Amazon offers a number of excellent tools to help enterprises keep their data (Read more click here) and applications safe in the cloud. Last year, Amazon unveiled Amazon Inspector, its host-based application vulnerability assessment tool to monitor what is installed and configured on each virtual Instance. This year, it’s Amazon Macie, a security service Read More