How to use machine learning and AI in cyber security
Cyber criminals are constantly seeking new ways to perpetrate a breach but thanks to artificial intelligence (AI) and its subset machine learning, it’s becoming possible
Cyber criminals are constantly seeking new ways to perpetrate a breach but thanks to artificial intelligence (AI) and its subset machine learning, it’s becoming possible
Building successful Business Intelligence solutions is a well-documented process with many successful, and unsuccessful projects to learn from. The traditional BI/DW model has always been
As chief information security officer for Amazon Web Services, Stephen Schmidt is surprised by how many businesses still fail to see the dangers of storing
As corporate data moves beyond the firewall and into the cloud and Internet of Things, encryption becomes more important than ever. We cover everything from
Cyber crime has been commercialized. Infecting computers with ransomware or using an advanced persistent threat to pilfer intellectual property no longer requires deep technical knowledge.
In cybersecurity, prevention is not the best medicine. Intervention is. As we’ve learned from recent infiltrations inside the networks of leading corporations and federal government
An online security breach at a national printing chain leaked thousands of sensitive documents — from labor filings involving NFL players to lawsuits against Hollywood
You can’t discuss the future of cybersecurity without considering emerging trends in technology and threat landscapes. As organizations develop and adopt technologies related to big
Since cyberattacks on hospital EHR systems have become a topic of nightly newscasts, no longer is anyone shocked by their scope and veracity. What is
Since cyberattacks on hospital EHR systems have become a topic of nightly newscasts, no longer is anyone shocked by their scope and veracity. What is
Open data is one of those refreshing trends that flows in the opposite direction of the culture of fear that has developed around data security.
Previously, only large entities such as governments and larger enterprises, could afford the massive infrastructure necessary for hosting and mining big data. Now as the