artificial intelligence
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094026/eye-400x200.jpg)
Avoiding a biometric dystopia
In part one of our two-part series, we explored how biometric authentication methods are being defeated. In the second part, we’ll explore how manipulating biometrics can …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095917/bot-400x200.jpg)
How can attackers abuse artificial intelligence?
Artificial intelligence (AI) is rapidly finding applications in nearly every walk of life. Self-driving cars, social media networks, cybersecurity companies, and everything in …
![spotlight](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101815/spotlight-400x200.jpg)
Only 25% of organizations using AI have an enterprise-wide AI strategy
Only 25% of global organizations that are already using artificial intelligence (AI) solutions, have developed an enterprise-wide AI strategy, according to IDC. At the same …
![lightbulb](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100102/lightbulb-2824864-400x200.png)
69% of organizations believe they can’t respond to critical threats without AI
Businesses are increasing the pace of investment in AI systems to defend against the next generation of cyberattacks, a study from the Capgemini Research Institute has found. …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110848/brain-hack-400x200.jpg)
How consumers view the transparency of their AI-enabled interactions
The ethical use of AI is becoming fundamental to winning people’s trust, a new study from the Capgemini Research Institute has found. As organizations progress to harness the …
![bot](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095917/bot-400x200.jpg)
Are humans ready for AI to take control of digital security?
Just over a quarter (26%) of people in EMEA would prefer their cybersecurity to be managed by AI rather than a human, an online study conducted by Palo Alto Networks and …
![businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105515/businessman-400x200.jpg)
Experts weigh in on salient issues around emerging threats and security tech
RSA Conference unveiled expert insights into salient issues around emerging threats and security technologies. Based on industry observations and interactions with partners …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101644/money-400x200.jpg)
Annual spend on Mobile Edge Computing will reach $11.2 billion by 2024
Total annual spend on Mobile Edge Computing (the collection and analysis of data at the source of generation, at the Edge of the network, instead of a centralised location …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100001/identity-400x200.jpg)
Beating biometrics: Why biometric authentication alone is not a panacea
As we witness the accelerating use of biometrics throughout our lives, we must pause to consider the risks and ramifications of doing so as technological advancements make it …
![syringe](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094039/syringe2-400x200.jpg)
Researchers develop a technique to vaccinate algorithms against adversarial attacks
A set of techniques to effectively vaccinate algorithms against adversarial attacks have been developed by researchers from CSIRO’s Data61. Algorithms …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105434/idea-400x200.jpg)
How can organizations leverage AI technologies to achieve project success?
AI disruption is happening and at a large scale: 81 percent of project professionals report their organization is being impacted by AI technologies; 37 percent say adopting AI …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194518/brain-400x200.jpg)
Organizations need capabilities and practices to generate value from AI
Businesses actively embracing artificial intelligence and striving to bring technological advancements into their operations are reaping dividends not seen by companies who …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities