Remove security-productivity-the-new-power-couple
article thumbnail

Tackling Cyber Threats: Is AI Cybersecurity Our Only Hope?

Jane Frankland

Could artificial intelligence (AI) be the key to outsmarting cyber threats in an increasingly connected world? On the other hand, it’s been portrayed as a potential threat to our privacy, security, creativity and even mankind’s existence. Is it our only hope for survival?These

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

Log4j is the latest, greatest vulnerability to demonstrate just how tenuous the security of modern networks has become. By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. Log4j bathes light on a couple of solidifying developments.

Firewall 223
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Backed by Japanese telecom giant NTT Group , this new facility instantly jumped into the vanguard of basic research already underway that will eventually enable the routine use of quantum computers, which, in turn, will open the door to things like driverless cars and Star Trekkian medical treatments. billion annually for R&D projects.

article thumbnail

Why Healthcare IoT Requires Strong Machine Identity Management

Security Boulevard

Patient data processing: Coupled with ML, IoMT can excessively reduce the effort of processing vast amounts of medical information to a few minutes, additionally offering possible treatment options. These new risks have created a dangerous security gap—new technology is introducing new risks and a larger attack surface.

article thumbnail

How Machine Learning Can Advance Cybersecurity Landscape

Spinone

Using both ML and AI in these realms, allows analyzing data and providing real-time intelligence in securing today’s infrastructure. Supervised and Unsupervised Machine Learning Machine learning algorithms generally fall in a couple of categories – supervised and unsupervised. This also includes infrastructure systems.

article thumbnail

MY TAKE: GraphQL APIs rev up innovation – but also introduce a potential security nightmare

The Last Watchdog

The software developers who are creating the coolest new mobile apps have a secret weapon. Like every other Internet breakthrough, GraphQL comes with a security tradeoff. Like every other Internet breakthrough, GraphQL comes with a security tradeoff. based software security vendor specializing in API data protection.

article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

To answer these questions, Paul Roberts, Editor-in-Chief of the Security Ledger, has founded securepairs.org , a group of infosec experts who are volunteering their free time to fight for the digital right to repair in local legislation. ” So should analyzing a device’s firmware for security flaws be considered illegal?

InfoSec 52