artificial intelligence
![cloud money](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093749/cloud-money1-400x200.jpg)
Cloud computing costs skyrocketing as businesses support a remote workforce
Anodot announced the results of a survey that reveals how organizations struggle to control skyrocketing cloud computing costs of the remote workforce, even as business moves …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/23122821/ai-brain-bkg-400x200.jpg)
For CISOs and artificial intelligence to evolve, trust is a must
Artificial Intelligence (AI) is no longer the future – it is already in use in our homes, cars, and, often, our pockets. As the technology continues to expand its role …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093901/ai1-400x200.jpg)
AI-based diagnostic processes that safeguard data privacy
Digital medicine is opening up entirely new possibilities. For example, it can detect tumors at an early stage. But the effectiveness of new AI algorithms depends on the …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194518/brain-400x200.jpg)
How do we decide whether or not to trust AI systems?
Every time you speak to a virtual assistant on your smartphone, you are talking to an artificial intelligence — an AI that can, for example, learn your taste in music and make …
![online marketplace](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/07094402/secure_online_marketplace-400x200.jpg)
How data manipulation could be used to trick fraud detection algorithms on e-commerce sites
As the marketing of almost every advanced cybersecurity product will tell you, artificial intelligence is already being used in many products and services that secure …
![building](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094642/building-400x200.jpg)
How willing are enterprise leaders to use top emerging technologies?
Emerging technologies can bring the potential for increased efficiencies, cost savings and improved security for enterprises, among other benefits—but also risk that must be …
![cloud binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194831/cloud_binary-400x200.jpg)
Businesses embracing cloud more than ever
Organizations are accelerating their cloud journey to take advantage of its flexibility, control costs, speed time-to-market, and simplify data management, according to …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094355/encryption-400x200.jpg)
Researchers design a way to make encrypted keys harder to crack
As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/30184922/biometrics2-400x200.jpg)
Scammers aren’t always who we expect them to be: How AI and biometrics can help
When it’s time to hire a new employee, organizations go to great lengths to avoid hiring someone who would commit fraud: background checks, credit checks, drug tests, etc. But …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/30184920/biometrics1-400x200.jpg)
DefakeHop: A deepfake detection method that tackles adversarial threat detection and recognition
Army researchers developed a deepfake detection method that will allow for the creation of state-of-the-art soldier technology to support mission-essential tasks such as …
![Kubernetes](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093639/kubernetes-400x200.jpg)
Kubernetes adoption continues to grow
Portworx released findings from its survey which assesses the mass adoption and evolution of Kubernetes usage among enterprise users in the last 12 months, in addition to the …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094216/brain-400x200.jpg)
Counterfit: Open-source tool for testing the security of AI systems
After developing a tool for testing the security of its own AI systems and assessing them for vulnerabilities, Microsoft has decided to open-source it to help organizations …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints