machine learning

From SmarterChild to Siri: Why AI is the competitive advantage securing businesses
The dream of an AI-influenced world is finally here. After decades of writing about it, AI has reached a point where it’s ingrained into our daily lives. From the days of …

Protecting iOS and Android applications in a fully automated way
In this Help Net Security podcast recorded at Black Hat USA 2019, Dave Belt, Technology Evangelist at Irdeto, and Jaco du Plooy, VP Cloakware at Irdeto, discuss the current …

AI vs. AI: Cybersecurity battle royale
David and Goliath. The Invasion of Normandy. No matter the generation, we all know some of the storied battles that have withstood the test of time. In cyberspace, however, …

Companies struggle with the slow, unpredictable nature of AI projects
Despite significant investment in AI, many companies are still struggling to stabilize and scale their AI initiatives, according to Dotscience. While 63.2% of businesses …

Current methods for anonymizing data leave individuals at risk of being re-identified
With the first large fines for breaching GDPR upon us, even anonymized datasets can be traced back to individuals using machine learning, researchers from University of …

Avoiding a biometric dystopia
In part one of our two-part series, we explored how biometric authentication methods are being defeated. In the second part, we’ll explore how manipulating biometrics can …

Beating biometrics: Why biometric authentication alone is not a panacea
As we witness the accelerating use of biometrics throughout our lives, we must pause to consider the risks and ramifications of doing so as technological advancements make it …

Researchers develop a technique to vaccinate algorithms against adversarial attacks
A set of techniques to effectively vaccinate algorithms against adversarial attacks have been developed by researchers from CSIRO’s Data61. Algorithms …

How can organizations leverage AI technologies to achieve project success?
AI disruption is happening and at a large scale: 81 percent of project professionals report their organization is being impacted by AI technologies; 37 percent say adopting AI …

Volume and quality of training data are the largest barriers to applying machine learning
IDC predicts worldwide spending on artificial intelligence (AI) systems will reach $35.8 billion in 2019, and 84% of enterprises believe investing in AI will lead to greater …

When all else fails, organizations realize they must share threat intel
A large majority of security IT decision makers are ready and willing to share valuable threat intelligence data to help the collective industry make better, more informed …

While data enables innovation, its vulnerability continues to cause anxiety among IT leaders
Today’s technology landscape demands that companies determine how to manage and secure data in a connected ecosystem, as well as embrace it to create competitive advantages. …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility