artificial intelligence
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095917/bot-400x200.jpg)
Organizations don’t trust AI enough to forego human-driven decision-making
Fivetran announced the results of a survey which shows that while 87 percent of organizations consider artificial intelligence (AI) vital to their business survival, 86 …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/23122821/ai-brain-bkg-400x200.jpg)
How AI and cybersecurity complement each other
As the modern world evolves, more threats arise. Knowledge of cybersecurity and artificial intelligence (AI) has become crucial to a successful business. Businesses everywhere …
![mask](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112954/mask-400x200.jpg)
Researchers defeat facial recognition systems with universal face mask
Can attackers create a face mask that would defeat modern facial recognition (FR) systems? A group of researchers from from Ben-Gurion University of the Negev and Tel Aviv …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093801/cloud-drive2-400x200.jpg)
How to eliminate the weak link in public cloud-based multi-party computation
Secure multi-party computation (MPC) has seen steady evolution to tackle many scientific challenges. These include enabling the creation and tuning of AI or machine learning …
![smart home](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104303/smart_home-400x200.jpg)
How to ensure that the smart home doesn’t jeopardize data privacy?
The smart home has been much hyped for what feels a very long-time, but I think it is fair to say that the smart home era is now truly upon us. This status has been almost …
![transform](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102903/transform-400x200.jpeg)
The price of an accelerated digital transformation
F5 announced a report which shows the challenges organizations face as they transform IT infrastructures to deliver and secure digital services that have become inseparable …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095742/data-400x200.jpg)
Data democratization leaves enterprises at risk
Today’s digital landscape has increased enterprises’ reliance on large datasets and analytics, underscoring the value of data for business. A recent report from NewVantage …
![robot](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110014/robot-1-400x200.jpg)
What is undermining ML initiatives?
Comet announced the results of its recent survey of machine learning professionals. Hundreds of enterprise ML practitioners were asked about their experiences and the factors …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/23122821/ai-brain-bkg-400x200.jpg)
AI market share to increase by $76.44 billion by 2025
The artificial intelligence (AI) market share is expected to increase by $76.44 billion from 2020 to 2025, with an accelerated CAGR of 21%, according to the recent market …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094916/data-400x200.jpg)
Data literacy to lead global workplaces by 2030
21% of employees believe their employer is preparing them for a more data-oriented and automated workplace, according to a research from Qlik. This is despite most business …
![Stephen Carter](https://img.helpnetsecurity.com/wp-content/uploads/2022/03/14123801/stephen_carter_2-nucleus-400x200.jpg)
Why a modern vulnerability management strategy requires state-of-the-art solutions
In this interview with Help Net Security, Stephen Carter, CEO at Nucleus Security, explains the importance of having a vulnerability management strategy within an …
![captcha](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095602/captcha-400x200.jpg)
Why are CAPTCHAs still used?
The success of your online business hinges on your customers’ ability to properly recognize crosswalks or traffic lights. I’m, of course, referring to CAPTCHAs, the online …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints