Security experts speaking on the ending "locknote" panel at this year's Black Hat Europe highlighted trends from the conference, including the rise of fuzzing, simplification via the cloud, increasing vendor transparency as well as the industry too often still failing to focus on the basics.
The use of artificial intelligence, machine learning and robotics has enormous potential, but along with that promise come critical privacy and security challenges, says technology attorney Stephen Wu.
The Zero Trust model of information security has become a fixture in both the strategies of enterprise security teams and the roadmaps of security solution developers and for good reason. Perimeter-focused security architectures that default to high trust levels on the internal network continue to fail disastrously...
How can banks leverage artificial intelligence and machine learning to drive innovation while ensuring that the project is secure and would not make the data vulnerable? How important is it to take a structured approach in implementing "security by design" for conducting proper risk assessments of the organizations...
A new defense company has been formed in United Arab Emirates, combining three government-owned and 22 independent companies in an effort to develop technologies to help thwart cyberattacks and repel military drones.
Elizabeth Denham, the U.K.'s chief privacy watchdog, is urging police to go slow when it comes to using live facial recognition. She also calls on the government to create a statutory code of practice for police use of the technology.
In the new world of ubiquitous connected devices and myriad cybersecurity alerts, artificial intelligence and machine learning can enable autonomous response - a boon to overworked security teams, says Darktrace's Mariana Pereira.
According to PwC's 22nd Annual Global CEO Survey, 85% of CEOs agree that Artificial Intelligence will significantly change the way they do business in the next five years.
The enterprise has embraced the public cloud. But tension and misalignment between CloudOps and business stakeholders impedes your organization from achieving all that it can.
Moreover, customers expect speed, scale and business agility from the cloud. CloudOps require continuous governance of security,
compliance...
Organizations are accepting that the network perimeter no longer serves as the "ultimate defense" and thus adapting zero-trust principles, including least privilege, based on the understanding that they may already have been compromised, says Darran Rolls of SailPoint.
Robotic process automation aims to use machine learning to create bots that automate high-volume, repeatable tasks. But as organizations tap RPA, they must ensure they take steps to maintain data security, says Deloitte's Ashish Sharma.
Criminals are weaponizing artificial intelligence and machine learning for cyberattacks. David Masson of Darktrace describes how to fight back at "machine speed."
The Cyber Exposure Score is an objective rating of cyber risk derived through data science-based measurement. The score is automatically generated daily through machine-learning algorithms that combine vulnerability data with other risk indicators such as threat intelligence and asset criticality. The Cyber Exposure...
Cybersecurity has become a popular agenda item with the board. But, conveying the complexities of cyber risk management to senior executives and the corporate board isn't easy.
To communicate cyber risk effectively, you must find a common business language grounded in risks, opportunities and business impact. Save...
London's Metropolitan Police Service says it shared seven images with a private developer during tests of facial recognition technology for crime prevention in the city's King's Cross section. There are no records related to the outcome of those tests, authorities say.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.