Please turn on your JavaScript for this page to function normally.
identity
Beating biometrics: Why biometric authentication alone is not a panacea

As we witness the accelerating use of biometrics throughout our lives, we must pause to consider the risks and ramifications of doing so as technological advancements make it …

syringe
Researchers develop a technique to vaccinate algorithms against adversarial attacks

A set of techniques to effectively vaccinate algorithms against adversarial attacks have been developed by researchers from CSIRO’s Data61. Algorithms …

idea
How can organizations leverage AI technologies to achieve project success?

AI disruption is happening and at a large scale: 81 percent of project professionals report their organization is being impacted by AI technologies; 37 percent say adopting AI …

brain
Volume and quality of training data are the largest barriers to applying machine learning

IDC predicts worldwide spending on artificial intelligence (AI) systems will reach $35.8 billion in 2019, and 84% of enterprises believe investing in AI will lead to greater …

sharing
When all else fails, organizations realize they must share threat intel

A large majority of security IT decision makers are ready and willing to share valuable threat intelligence data to help the collective industry make better, more informed …

hand
While data enables innovation, its vulnerability continues to cause anxiety among IT leaders

Today’s technology landscape demands that companies determine how to manage and secure data in a connected ecosystem, as well as embrace it to create competitive advantages. …

money
C-Suite execs and policy makers find cybersecurity technology investments essential

The majority of C-Suite executives and policy makers in the United States believe investing in security software, infrastructure and emerging technologies is critical to …

healthcare
Legacy infrastructures and unmanaged devices top security risks in the healthcare industry

The proliferation of healthcare IoT devices, along with unpartitioned networks, insufficient access controls and the reliance on legacy systems, has exposed a vulnerable …

5G
Closed loop automation combats IoT security threats in the 5G age

The 5G race is on as carriers prepare for the onset of the next wireless generation in their own ways. While some have pseudo-definitions of 5G, others like Verizon and …

idea
Organizations investing in security analytics and machine learning to tackle cyberthreats

IT security’s greatest inhibitor to success is contending with too much security data. To address this challenge, 47 percent of IT security professionals acknowledged their …

Capgemini research
Status of AI implementation at automotive organizations

Just 10 percent of major automotive companies are implementing artificial intelligence (AI) projects at scale, with many falling short of an opportunity that could increase …

people
Nearly half of organizations lack the necessary talent to maintain security measures

Regardless of their size, organizations share a common challenge: IT security teams are understaffed and overextended. The number of security alerts, the challenge of what to …

Don't miss

Cybersecurity news