Sunday, November 28, 2021

IBM acquiring Agile 3 Solutions to give execs visiblity into security risks

IBM Security has acquired Agile 3 Solutions, a San Francisco-based company with a security analytics dashboard aimed at helping executives understand cyber-security risks inside an organization. The...

None of your data is private, Evernote reminds us

In case you needed another reminder that there's no such thing as true privacy online ... here it is: Note-taking app Evernote said this week...

McAfee CTO On Election Hacking, Cryptojacking, Quantum Security

Election hacking. Information warfare. Adversarial artificial intelligence. All worrisome topics racing through Steve Grobman’s head these days. But the McAfee chief technology officer seems...

AI and machine learning is key to protecting enterprise IT

Machine learning and AI could be the key to protecting enterprise IT from advancing cybersecurity threats, Cylance CEO Stuart McClure said on Tuesday. According...

3 Ways Blockchain is Changing Cybersecurity

Bitcoin, Ethereum, and other cryptocurrencies are making their way from the dark alleys of SilkRoad and AlphaBay into the mainstream. Suddenly, investing in these digital currencies...

Insurance to Mitigate the Risk of AI Systems Coming into View  

By John P. Desmond, AI Trends Editor   Companies are interested in buying insurance to mitigate the risk of adoption and deployment of new AI applications...

AI in the Forefront of Evolving Data Privacy Protections

By AI Trends Staff Several large US banks recently tightened their third-party data sharing practices, a win for consumer privacy in an era when AI...

Web Applications are Focus of Cybercrime Gangs in Data Breaches, Report Finds

By John P. Desmond, AI Trends Editor Web applications are the primary focus of many cybercrime gangs engaged in data breaches, a primary security concern...

Phishing Attacks Now a Focus for AI Cybersecurity Tools 

By John P. Desmond, AI Trends Editor   AI cybersecurity tools are beginning to focus on a rising number of phishing attacks, which involve fraudulent messages...

AI Image Recognition is Not Perfect, Opens Security Concerns

OUR MACHINES ARE littered with security holes, because programmers are human. Humans make mistakes. In building the software that drives these computing systems, they allow...
- Advertisement -




APPLICATIONS

AI and Business Strategy: Think Big, Start Small and Scale Fast

It’s time to take a step back from the noise and hype surrounding artificial intelligence (AI). Businesses have been inundated with AI sales pitches promoting...

HOT NEWS