Ethics of Artificial Intelligence – Cisco Blogs by Utkarsh Srivastava

Ethics of Artificial Intelligence – Cisco Blogs by Utkarsh Srivastava

Intelligent machines have helped humans in achieving great endeavors. Artificial Intelligence (AI) combined with human experiences have resulted in quick wins for stakeholders across multiple industries, with use cases ranging from finance to healthcare to marketing to operations and more. There is no denying the fact that Artificial Intelligence (AI) has helped in quicker product innovation and an enriching user experience. However, few of these use cases include context-aware marketing, sales forecasting, conversational analytics, fraud…

Read More

Secure Workload Protection: Extending Micro Perimeters and Automation to Enterprise IaaS – Cisco Blogs

Secure Workload Protection: Extending Micro Perimeters and Automation to Enterprise IaaS – Cisco Blogs

This post was authored by Frank Dickson, Program Vice President, Cybersecurity Products, IDC The best kept secret in cloud workload security is that Cisco is number two in revenue market share according to IDC, just shy of $100 million in 2019 and almost certain to exceed $100 million in 2020 (please stay tuned). The reason for the “secret” is that the path that Cisco has taken is a bit atypical for Cisco. In other security…

Read More

Palo Alto grows cloud security portfolio with new Prisma release, Bridgecrew buy

Palo Alto grows cloud security portfolio with new Prisma release, Bridgecrew buy

Palo Alto had a busy week. First, it rolled out a number of new features for its Prisma cloud-based security package, and then it announced plans to buy cloud security vendor Bridgecrew for about $156 million in cash. Palo Alto’s Prisma is a cloud-based security package that includes access control, advanced threat protection, user behavior monitoring and other services that promise to protect enterprise applications and resources. Managed through a single console, Prisma includes firewall…

Read More

The fine line between global COVID-19 protocols and privacy

The fine line between global COVID-19 protocols and privacy

A panel of experts considers the best methods for safe domestic and international air travel including proof of testing, vaccination passports, and digital health passes. Image: iStock/Vanessa Nunes A recent panel conducted by the security firm Concentric Advisors, “Protocols, Testing, and Proof of Vaccine—What is the future of privacy and travel?” took a deep dive predicting how domestic and international air travel can be safely mandated during the continuing COVID-19 worldwide pandemic.  The panel of…

Read More

Neighbor Revealed as Cyber-Stalker

Neighbor Revealed as Cyber-Stalker

A South African man has admitted carrying out a cyber-harassment campaign against his neighbors in an attempt to extort money.  Residents of the same quiet street in a Durban suburb that Dharmesh Singh calls home were subjected to weeks of abuse with no idea that the person behind it was their immediate neighbor.  Twenty-three-year-old Singh used unregistered SIM cards to create fake social media profiles from which he sent threatening messages to residents of Battersea Road,…

Read More

5 New Ways to Add Simplicity to Your Workday

5 New Ways to Add Simplicity to Your Workday

The 10x Better Experience for IT series focuses on enhanced data capabilities that empower IT administrators to manage more effectively Regardless of where work happens, we strive to bring simplicity to your workday. This month is packed full of new integrations and exciting feature additions to existing integrations focused on collaboration devices and messaging. Device Integrations: Devices play an important part in safely getting back into the office. They enable us to connect, learn and…

Read More

How to Deploy GPU-Accelerated Applications on Amazon ECS with Docker Compose – Docker Blog

How to Deploy GPU-Accelerated Applications on Amazon ECS with Docker Compose – Docker Blog

Many applications can take advantage of GPU acceleration, in particular resource-intensive Machine Learning (ML) applications. The development time of such applications may vary based on the hardware of the machine we use for development. Containerization will facilitate development due to reproducibility and will make the setup easily transferable to other machines. Most importantly, a containerized application is easily deployable to platforms such as Amazon ECS, where it can take advantage of different hardware configurations. In…

Read More

Europeans Unhappy with TikTok’s Child Safety Policy

Europeans Unhappy with TikTok’s Child Safety Policy

European consumer groups have accused video-sharing app TikTok of failing to protect minor users from inappropriate content and hidden advertising. The Chinese-owned app was the target of multiple complaints from organizations in 15 different countries on Tuesday for allegedly violating European consumer rights. Along with its treatment of children and teens, the app was slammed for its allegedly unfair terms of service, misleading data-processing practices, and virtual gifts feature critics say modifies the exchange rate so transactions are financially in the…

Read More

Understanding Container Images, Part 3: Working with Overlays

Understanding Container Images, Part 3: Working with Overlays

In the previous two posts we discussed how container images are built and how we can build optimal Dockerfiles to make the best use of layers. On this post, we are going to dig more on the mechanism docker uses to work with the layers, and how we can use it for other projects. Linux filesystems Docker relies on storage drivers to create the container filesystem. This allows docker to work with different Linux distributions…

Read More

Cyber Defense Magazine nominated Cobwebs Technologies for Its 2021 InfoSec Awards for threat intelligence

Cyber Defense Magazine nominated Cobwebs Technologies for Its 2021 InfoSec Awards for threat intelligence

By Udi Levy, CEO & Co-Founder at Cobwebs Technologies With a growing number of malicious cyber activities, threat intelligence has become an integral part of many organizations. Most threat intelligence solutions available in the market still rely on analysts or investigators collecting, processing, and analyzing huge amounts of data for actionable insights. Collecting and processing these millions of data points and indicators is just too much for human analysts to effectively identify threats and process…

Read More
1 52 53 54 55 56 268