article thumbnail

Video: Can big data and machine learning kill two-factor authentication?

Tech Republic Security

Lastwall co-founder and CEO Karl Holmqvist explains how artificial intelligence could could soon eliminate the need for password-based security.

article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

The amount of data in the world topped an astounding 59 zetabytes in 2020, much of it pooling in data lakes. We’ve barely scratched the surface of applying artificial intelligence and advanced data analytics to the raw data collecting in these gargantuan cloud-storage structures erected by Amazon, Microsoft and Google.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Exploring Cybersecurity Research Topics for Master’s Degree Studies

CyberSecurity Insiders

Explore topics such as authentication protocols, encryption mechanisms, and anomaly detection techniques to enhance the security and privacy of IoT ecosystems. Privacy and Data Protection: Explore techniques and frameworks for protecting personal information and ensuring compliance with privacy regulations.

article thumbnail

Advancing Trust in a Digital World

Thales Cloud Protection & Licensing

As new technologies, like artificial intelligence, cloud computing, blockchain, and the Internet of Things (IoT), become increasingly prominent in the workplace, digital trust practitioners will need to adapt responsibly and safely. Identify: An organization must be able to discover data wherever it resides and classify it.

article thumbnail

The Deepfakes Lab: Detecting & Defending Against Deepfakes with Advanced AI

McAfee

Deepfakes are a cutting-edge advancement of Artificial Intelligence (AI) often leveraged by bad actors who use the technology to generate increasingly realistic and convincing fake images, videos, voice, and text. Additionally, steps need to be taken to defend against deepfakes by making use of watermarks or authentication trails.

Media 88
article thumbnail

Thales’ Leading Position in Connectivity & Cybersecurity to Bring Trust to the Next Wave of Connected Cars

CyberSecurity Insiders

To ensure a high degree of security, Thales supports steadfast cyber security infrastructures through advanced consulting services , strong digital authentication and encryption mechanisms. About Thales.

article thumbnail

Machine Identities are Essential for Securing Smart Manufacturing

Security Boulevard

The Industrial Internet of Things (IIoT) puts networked sensors and intelligent devices directly on the manufacturing floor to collect data, drive artificial intelligence and do predictive analytics. Driving an industrial revolution. More safety in operations. Smart metering. Meeting compliance requirements.