artificial intelligence
![SecOps](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/02172811/secops-gears-400x200.jpg)
The impact of current and emerging threats on the day-to-day lives of SecOps teams
More than half of IT and cybersecurity professionals noted ransomware or zero-day attacks as the biggest threats to their organization, according to a Deep Instinct survey. …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095727/iot-400x200.jpg)
Preventing security issues from destroying the promise of IoT
Internet of Things (IoT) devices fall into various categories. Some, such as those located in a hospital setting, are very sophisticated, with advanced operating systems and …
![cloud money](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093749/cloud-money1-400x200.jpg)
Cloud computing costs skyrocketing as businesses support a remote workforce
Anodot announced the results of a survey that reveals how organizations struggle to control skyrocketing cloud computing costs of the remote workforce, even as business moves …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/23122821/ai-brain-bkg-400x200.jpg)
For CISOs and artificial intelligence to evolve, trust is a must
Artificial Intelligence (AI) is no longer the future – it is already in use in our homes, cars, and, often, our pockets. As the technology continues to expand its role …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093901/ai1-400x200.jpg)
AI-based diagnostic processes that safeguard data privacy
Digital medicine is opening up entirely new possibilities. For example, it can detect tumors at an early stage. But the effectiveness of new AI algorithms depends on the …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194518/brain-400x200.jpg)
How do we decide whether or not to trust AI systems?
Every time you speak to a virtual assistant on your smartphone, you are talking to an artificial intelligence — an AI that can, for example, learn your taste in music and make …
![online marketplace](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/07094402/secure_online_marketplace-400x200.jpg)
How data manipulation could be used to trick fraud detection algorithms on e-commerce sites
As the marketing of almost every advanced cybersecurity product will tell you, artificial intelligence is already being used in many products and services that secure …
![building](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094642/building-400x200.jpg)
How willing are enterprise leaders to use top emerging technologies?
Emerging technologies can bring the potential for increased efficiencies, cost savings and improved security for enterprises, among other benefits—but also risk that must be …
![cloud binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194831/cloud_binary-400x200.jpg)
Businesses embracing cloud more than ever
Organizations are accelerating their cloud journey to take advantage of its flexibility, control costs, speed time-to-market, and simplify data management, according to …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094355/encryption-400x200.jpg)
Researchers design a way to make encrypted keys harder to crack
As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/30184922/biometrics2-400x200.jpg)
Scammers aren’t always who we expect them to be: How AI and biometrics can help
When it’s time to hire a new employee, organizations go to great lengths to avoid hiring someone who would commit fraud: background checks, credit checks, drug tests, etc. But …
![biometrics](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/30184920/biometrics1-400x200.jpg)
DefakeHop: A deepfake detection method that tackles adversarial threat detection and recognition
Army researchers developed a deepfake detection method that will allow for the creation of state-of-the-art soldier technology to support mission-essential tasks such as …
Featured news
Resources
Don't miss
- Crypto-stealing iOS, Android malware found on App Store, Google Play
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer