AI, ML can bolster cybersecurity, and vice versa, professor says

AI, ML can bolster cybersecurity, and vice versa, professor says

Howard University professor talks about his research in emerging technologies. TechRepublic’s Karen Roby spoke with Dr. Danda Rawat, professor of electrical engineering and computer science at Howard University, about artificial intelligence (AI), machine learning (ML) and how they can help cybersecurity. The following is an edited transcript of their conversation. Karen Roby: I know that your, your focus a lot is on AI, machine learning, and wireless networking for connected systems. Expand on that for…

Read More

The Cisco Partner Program – Changes to our Integrator Role – Cisco Blogs

The Cisco Partner Program – Changes to our Integrator Role – Cisco Blogs

This past October at Cisco Partner Summit Digital we announced the largest change to the Cisco Partner Program in over a decade.  Marc Surplus, our Vice President of Strategy, Planning and Programs followed up with a great blog that if you have not had a chance to see, I would recommend you read.  We are going to continue to keep you informed on all the latest changes with a monthly series of blogs from experts…

Read More

Alibaba Facial Recognition Tech Picks Out Uyghur Minorities

Alibaba Facial Recognition Tech Picks Out Uyghur Minorities

Chinese multinational technology company Alibaba Group Holding Ltd is offering Uyghur/ethnic minority recognition as a cloud service, according to a new report by surveillance industry researcher IPVM and The New York Times. Users simply send photographs of people taken on their phones or pulled from surveillance videos to Alibaba’s facial recognition service, then receive an alert if the subject is identified as a minority Uyghur from the western province of Xinjiang. The Cloud Shield system offered by Alibaba Cloud “detects and recognizes text, pictures, videos, and…

Read More

5G standalone networks may have more vulnerabilities than you think

5G standalone networks may have more vulnerabilities than you think

Security research firm examines configuration of core components to spot weaknesses in PFCP and HTTP/2 protocols. Global cybersecurity company Positive Technologies identified several potential vulnerabilities in 5G standalone networks that could result in denial of service for customers and trouble for network operators.   In the new report, “5G Standalone core security research,” researchers analyzed the security of the network architecture, interaction of network elements, and subscriber authentication and registration procedures. The report considered these…

Read More

A remote holiday season: Top tips to boost security as cyber hygiene diminishes

A remote holiday season: Top tips to boost security as cyber hygiene diminishes

A remote holiday season: Top tips to boost security as cyber hygiene diminishes | 2020-12-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Key questions to ask to effectively recover from a cyberattack

Key questions to ask to effectively recover from a cyberattack

Cyberattack recovery frameworks are a necessary part of cybersecurity. Learn how to develop a recovery plan that meets your company’s needs. Image: iStockphoto/Andriy Onufriyenko The cliche, “It’s not a matter of if, but when” is wearing thin when it comes to cybersecurity; however, no matter how weary the cliche, it can serve as a reminder to prepare for a cyberattack. During an attack, cybercriminals are counting on the fact that no one is thinking clearly,…

Read More

The Crown Prosecution Service (CPS) Has Recorded 1,627 Data Breaches Over the Entirety of the 2019-20 Financial Year, Up From 1,378 In the Previous Financial Year – Cyber Defense Magazine

The Crown Prosecution Service (CPS) Has Recorded 1,627 Data Breaches Over the Entirety of the 2019-20 Financial Year, Up From 1,378 In the Previous Financial Year – Cyber Defense Magazine

By Andy Harcup, VOP, Absolute Software The annual CPS report, analyzed by Griffin Law, a UK litigation practice, revealed that 59 incidents were so severe that they were reported to the Information Commissioner’s Office (ICO) and potentially affected up to 1,346 people. The CPS is hardly the first agency to struggle with device and data security, but the lack of urgency shown by the government over these persistent threats to the UK’s national cyber security is troubling….

Read More

Will the US Move to a Federal Privacy Law in 2021?

Will the US Move to a Federal Privacy Law in 2021?

Data privacy trends in the US in light of this year’s election and other recent events were discussed by a panel during the FTI Consulting webinar The New Privacy Landscape: California’s New Law and Prospects for Federal Action. The significance of the California Privacy Rights Act (CPRA), passed last month to expand the existing California Consumer Privacy Act (CCPA) was firstly highlighted by the panel. Dominique Shelton Leipzig, firmwide co-chair of Perkins Coie’s Ad Tech…

Read More

Cloud exit planning – building a future‐proofed, multi-cloud strategy (part one of two) – VMware Cloud Community

Cloud exit planning – building a future‐proofed, multi-cloud strategy (part one of two) – VMware Cloud Community

Multi-cloud is now clearly emerging as a strategic driver for many organizations as they seek to innovate and build a competitive edge. However, this shift brings with it challenges, many of which I discussed in a prior blog series.  With organizations seeing increased complexity, projects falling short of targets, and growing cloud consumption bills; these challenges, if not addressed, can drive negative impacts that offset the business value gained from leveraging the public cloud. But…

Read More
1 3,326 3,327 3,328 3,329 3,330 3,465