AI in Cyber Security
AI’s Primary Task (and Primary Limitation) In the past, cyber defense was all about analyzing system logs and alerts from IPS/ AV products. Today, we face advanced attacks
AI’s Primary Task (and Primary Limitation) In the past, cyber defense was all about analyzing system logs and alerts from IPS/ AV products. Today, we face advanced attacks
Cybersecurity defenses are under unprecedented levels of attack. From old malware foes and newer types, such as ransomware, to sophisticated advanced threats and state-sponsored cyberattacks, breaches are, sadly,
It seems like everyone is now talking about blockchain. It's all over the net! What is blockchain? What's it used for? And how can it be helpful with
It appears Mirai may have some competition. And its name is WireX. Google recently removed roughly 300 apps from its Play Store after researchers found that the apps
In an example of life imitating art, hackers recently stole 1.5 terabytes of data from HBO, including full episodes of popular shows like “Ballers” and at least one script
Privileged password management, sometimes called enterprise password management, refers to the practice and technique of securely controlling credentials for privileged accounts, services, systems, applications, and more. But unfortunately,
This week I met with a company, who specializes in satellite communications, to discuss possible use cases for leveraging their services for IoT. The truth is, satellites open
Data, analytics, and the devices used to access and gather them have changed our lives for the better. From giving us the insight we need to improve critical
Do you think about the need to secure IoT? It could be a patient monitor, a security camera or a lighting system; every connection to the network is
By replacing dedicated network appliances, such as routers and firewalls, with software running on commercial, off-the-shelf servers, Network Functions Virtualisation (NFV) is transforming the way communication service providers