Help Net Security
How to drive business value through balanced development automation
Aligning security and delivery at a strategic level is one of the most complex challenges for executives. It starts with an understanding that risk-based thinking should not …
A new project enables data to be read directly from compressed IoT data
The Network Computing, Communications and Storage research group at Aarhus University has developed a completely new way to compress data. The new technique provides …
Week in review: ERP security, early warning of ransomware, Active Directory disaster recovery
Here’s an overview of some of last week’s most interesting news and articles: ERP security: Dispelling common misconceptions The various applications integrated in …
Vulnerability reporting is returning to normal
Vulnerability reporting, still impacted by COVID-19, is beginning to return to normal, Risk Based Security reveals. Out of 11,121 vulnerabilities aggregated during the first …
Data protection critical to keeping customers coming back for more
Although consumers remain concerned about sharing personal data with companies, the results of a Privitar survey highlight an opportunity for businesses to take a leadership …
The global cost of cybercrime per minute to reach $11.4 million by 2021
Cybercrime costs organizations $24.7, YOY increase of more than $2 every minute, a RiskIQ report reveals. It will also have a per-minute global cost of $11.4 million by 2021, …
Worldwide AI spending to reach more than $110 billion in 2024
Global spending on AI is forecast to double over the next four years, growing from $50.1 billion in 2020 to more than $110 billion in 2024. According to IDC, spending on AI …
People spend a little less time looking at fake news headlines than factual ones
The term fake news has been a part of our vocabulary since the 2016 US presidential election. As the amount of fake news in circulation grows larger and larger, particularly …
Facing gender bias in facial recognition technology
In the 1960s, Woodrow W. Bledsoe created a secret program that manually identified points on a person’s face and compared the distances between these coordinates with other …
91% of cybersecurity pros want stricter internet measures to tackle misinformation
There’s a growing unease amongst the cybersecurity community around the recent rise in misinformation and fake domains, Neustar reveals. 48% of cybersecurity …
Researchers develop AI technique to protect medical devices from anomalous instructions
Researchers at Ben-Gurion University of the Negev have developed a new AI technique that will protect medical devices from malicious operating instructions in a cyberattack as …
A look at enterprise network and application modernization efforts
80% of organizations are struggling to reach application delivery requirements with their existing infrastructure. But, amid pandemic concerns, efforts to modernize networks …