article thumbnail

On Technologies for Automatic Facial Recognition

Schneier on Security

Interesting article on technologies that will automatically identify people: With technology like that on Mr. Leyvand’s head, Facebook could prevent users from ever forgetting a colleague’s name, give a reminder at a cocktail party that an acquaintance had kids to ask about or help find someone at a crowded conference.

article thumbnail

Building a Cyber Threat Hunting Team: Methods, Strategies and Technologies

Tech Republic Security

Cyber threat hunting combines strategies, advanced technologies and skilled analysts to methodically examine networks, endpoints and data repositories. This TechRepublic Premium article, written by Franklin Okeke, aims to look at threat hunting.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

InfoWorld’s 2023 Technology of the Year Award winners

InfoWorld on Security

With amazing speed, generative AI has rippled across the entire information technology landscape—from software development and devops tools, to data management platforms and analytics tools, to cloud security, compliance, and governance solutions. To read this article in full, please click here

article thumbnail

Protecting the Privacy of Our Thoughts from Brain Scanning Technology

SecureWorld News

This morning, I read an article about how brain scanning technology is causing Colorado and Minnesota to propose legislation that is aimed at establishing rights and protections for information collected from our thoughts through the neural signals that can be scanned and collected from our brains. What do you think?

article thumbnail

Why CISO roles require business and technology savvy

CSO Magazine

This was a few years ago, and one can only guess that the role had been created by a technologist who didn’t care about or didn’t understand the business—or, inversely by a businessperson who didn’t understand enough about technology. To read this article in full, please click here In either case, the disconnect is real.

CISO 125
article thumbnail

BrandPost: The state of operational technology and cybersecurity

CSO Magazine

Today, the convergence of operational technology (OT) and IT networks is accelerating because organizations can use the data collected by physical equipment and Industrial Internet of Things (IIoT) devices to identify issues and increase efficiency. To read this article in full, please click here

article thumbnail

Managing technology risk

CyberSecurity Insiders

AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Numerous risks are inherent in the technologies that all organizations use. The content of this post is solely the responsibility of the author.