article thumbnail

Decoding Security 127: We Got Conned

SiteLock

The conference held many briefings on politics, legislation, and Machine Learning (ML) and Artificial Intelligence (AI) in cybersecurity, as well as the challenge of endpoint security for many IoT devices.

article thumbnail

Machine Identities are Essential for Securing Smart Manufacturing

Security Boulevard

The Industrial Internet of Things (IIoT) puts networked sensors and intelligent devices directly on the manufacturing floor to collect data, drive artificial intelligence and do predictive analytics. The following are six advantages of IoT in the manufacturing industry. Driving an industrial revolution. Quality control.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Episode 168: Application Security Debt is growing. Also: Web App Security in the Age of IoT

The Security Ledger

» Related Stories Huge Survey of Firmware Finds No Security Gains in 15 Years Episode 166: But Why, AI? ZestAI’s Quest to make Artificial Intelligence Explainable Episode 164: Who owns the Data Smart Cars collect? Securing Web Applications in the Age of the IoT. Read the whole entry. »

IoT 40
article thumbnail

Episode 168: Application Security Debt is growing and Securing Web Apps in the Age of IoT

The Security Ledger

» Related Stories Huge Survey of Firmware Finds No Security Gains in 15 Years Episode 166: But Why, AI? ZestAI’s Quest to make Artificial Intelligence Explainable Episode 164: Who owns the Data Smart Cars collect? Securing Web Applications in the Age of the IoT. Read the whole entry. »

IoT 40
article thumbnail

Bad News: AI and 5G Are Expected to Worsen Cybersecurity Risks

Security Affairs

Experts believe Artificial intelligence (AI) could introduce new cybersecurity concerns, and that the upcoming 5G network could pose new risks as well. Information Risk Management (IRM) recently published its 2019 Risky Business Report. Here’s a look at how the report frames AI and 5G in cybersecurity.

Risk 91
article thumbnail

Five takeaways from the Oldsmar water facility attack

SC Magazine

Industrial networks contain thousands of OT and IoT devices from a variety of vendors. Automated network anomaly detection solutions leverage artificial intelligence to run detection against the actual parameters that are used to control the industrial process. Identify and patch vulnerabilities.

article thumbnail

Five takeaways from the Oldsmar water facility attack

SC Magazine

Industrial networks contain thousands of OT and IoT devices from a variety of vendors. Automated network anomaly detection solutions leverage artificial intelligence to run detection against the actual parameters that are used to control the industrial process. Identify and patch vulnerabilities.