Companies are using AI to hit business goals, even though they can’t explain how it works

Companies are using AI to hit business goals, even though they can’t explain how it works

A new survey of tech decision makers finds that security concerns are high and trust is low when it comes to artificial intelligence. Image: KOHb, Getty Images/iStockphoto Artificial intelligence (AI) algorithms are hard at work for many businesses, despite the fact that no one has figured out explainability, according to a new survey. Research from Modzy found that security is also a serious concern with 72% of companies reporting that security breaches or threats to…

Read More

Babuk Ransomware | McAfee Blogs

Babuk Ransomware | McAfee Blogs

Executive Summary Babuk ransomware is a new ransomware threat discovered in 2021 that has impacted at least five big enterprises, with one already paying the criminals $85,000 after negotiations. As with other variants, this ransomware is deployed in the network of enterprises that the criminals carefully target and compromise. Using MVISION Insights, McAfee was able to plot the telemetry of targets, revealing that the group is currently targeting the transportation, healthcare, plastic, electronics, and agricultural…

Read More

Cyber resilience: Protecting the vaccine supply chain

Cyber resilience: Protecting the vaccine supply chain

Cyber resilience: Protecting the vaccine supply chain | 2021-02-24 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Addressing security risks of personal business in the workplace

Addressing security risks of personal business in the workplace

Addressing security risks of personal business in the workplace | 2021-02-24 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Why security must be shifted left in a cloud-first strategy

Why security must be shifted left in a cloud-first strategy

Why security must be shifted left in a cloud-first strategy | 2021-02-24 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Black History Month: diversity in cybersecurity is more important than tech

Black History Month: diversity in cybersecurity is more important than tech

Each February, the United States, Canada, the United Kingdom and other countries observe Black History Month. It’s a month-long celebration of the generations of black people who have elevated society by the way in which they’ve lived their lives. It’s also an opportunity for us to recognize that there’s still plenty of work to do in the name of promoting diversity and inclusion. This moment reaches into every sector—including cybersecurity. Indeed, (ISC)2 found that minority…

Read More

Texas power outage highlights need for better use of data analytics, modeling and policy making

Texas power outage highlights need for better use of data analytics, modeling and policy making

Texas power outage highlights need for better use of data analytics, modeling and policy making Length: 9:52 | Feb 23, 2021 Rob Robinson, client partner in utilities practice for Capgemini, talks with TechRepublic about what the catastrophic outages in Texas should teach us about predicting threats to U.S. the power grid. Source link

Read More

Texas power outage: Data analytics, modeling and policy making will be key to preventing similar disasters

Texas power outage: Data analytics, modeling and policy making will be key to preventing similar disasters

Protecting the U.S. power grid from serious outages, like the one following a 2021 winter storm in Texas, will require a better use of data analytics, modeling and policy making says industry expert. TechRepublic’s Karen Roby spoke with Rob Robinson, client partner in utilities practice for Capgemini, an IT consulting company, about predicting threats to the power grid following catastrophic outages in Texas after a winter storm. The following is an edited transcript of their…

Read More

Top 5 things to know about network attacks

Top 5 things to know about network attacks

DDoS, SQL injection, and man-in-the-middle are just a few of the attacks that can compromise your network. Tom Merritt lists five things to know about network attacks. Your network needs to be accessible. It’s how your business operates and how your company’s workflow stays efficient. Your network also needs to be closed off from the bad folks. Network attacks are on the rise. Sometimes intruders want to steal data, sometimes they just want to cause…

Read More
1 2,478 2,479 2,480 2,481 2,482 2,644