Commercial Services & Supplies

Surveillance cameras in parts of Pennsylvania use hackable Chinese tech and can recognize faces


Their lifeless eyes peer from building facades, lampposts and streetlight poles. They never sleep, never even blink. And now, enabled by advances in computing power and artificial intelligence, surveillance cameras can do more than just watch. They can recognize, and they can remember. The district attorney for Pennsylvania's second-most-populous county has assembled a network of advanced surveillance cameras in and around Pittsburgh and has enlisted colleagues in four surrounding counties to extend its reach into their jurisdictions.

Black Mirror-like robodog 'Astro' can respond to commands such as 'sit', 'stand' and 'lie down'

Daily Mail - Science & tech

With his 3-D printed doberman-like head, robot dog Astro may look like something out of a Black Mirror episode -- but this clever canine may be our new best friend. Powered by artificial intelligence technology, the metallic mutt can presently respond to simple commands like'sit', 'stand' and'lie down'. However, by training him in thousands of different scenarios, this robot dog is capable of learning new tricks. His developers expect that he will eventually be able to recognise different languages, hand signals, people and other dogs -- and even team up with drones. Astro is intended to help security forces sniff out prohibited items and first responders scour disaster sites -- but he might even find work as a guide dog.

Artificial intelligence can contribute to a safer world – TechCrunch


We all see the headlines nearly every day. Whether primitive (gunpowder) or cutting-edge (unmanned aerial vehicles) in the wrong hands, technology can empower bad actors and put our society at risk, creating a sense of helplessness and frustration. Current approaches to protecting our public venues are not up to the task, and, frankly appear to meet Einstein's definition of insanity: "doing the same thing over and over and expecting a different result." It is time to look past traditional defense technologies and see if newer approaches can tilt the pendulum back in the defender's favor. Artificial Intelligence (AI) can play a critical role here, helping to identify, classify and promulgate counteractions on potential threats faster than any security personnel.

Regulator looking at use of facial recognition at King's Cross site

The Guardian

The UK's privacy regulator said it is studying the use of controversial facial recognition technology by property companies amid concerns that its use in CCTV systems at the King's Cross development in central London may not be legal. The Information Commissioner's Office warned businesses using the surveillance technology that they needed to demonstrate its use was "strictly necessary and proportionate" and had a clear basis in law. The data protection regulator added it was "currently looking at the use of facial recognition technology" by the private sector and warned it would "consider taking action where we find non-compliance with the law". On Monday, the owners of the King's Cross site confirmed that facial recognition software was used around the 67-acre, 50-building site "in the interest of public safety and to ensure that everyone who visits has the best possible experience". It is one of the first landowners or property companies in Britain to acknowledge deploying the software, described by a human rights pressure group as "authoritarian", partly because it captures images of people without their consent.

Quantum Computing - A Quick Look Quantum & Cloud Computing


The new technological innovations are revolutionizing various industries -- from pharmaceuticals and healthcare to cybersecurity and FinTech -- and one such invention is Quantum Computing. The branch of mechanics'Quantum' itself is vast and intimidating enough, and combining it with computing technology opens new doors to an unimaginably vast framework of reality. Any discussion of quantum computing is reminiscent of a quantum jump into a science-fiction world. Well, advancements like cryptography systems are not only limited to the realms of sword and sorcery. We soon will be able to harness the power of quantum weirdness to design ultra-powerful computers and solve real-world problems such as climate, traffic, security, and other issues.

Introducing CylanceGUARD : BlackBerry Cylance's Comprehensive Security Solution


BlackBerry Cylance is pleased to announce the debut of CylanceGUARD, a comprehensive security solution that delivers continuous threat prevention across the entire enterprise and response automation powered by BlackBerry Cylance's groundbreaking artificial intelligence platform. CylanceGUARD is a 24x7 managed detection and response (MDR) offering that provides actionable intelligence to prevent and respond to threats quickly, minimizing alert fatigue while delivering the context required to streamline investigations led by world-class threat hunting and incident response experts. The solution also provides an advanced orchestration engine with custom filters to reduce false positives and alert fatigue, bolstering an organization's security posture by providing automated remediation rules to reduce the time lost to manual incident response actions. CylanceGUARD provides proactive threat hunting processes beyond simple alert management, freeing up human resources for other security initiatives and instantly maturing a customer's security program. CylanceGUARD increases overall environment visibility and simplifies complex workflows to dramatically reduce dwell time in identifying and remediating attacks and the proliferation of system intrusions.

Paul Friedman on LinkedIn: "Excellent Gartner insights on all things privacy. Our partner Verint has #AI powered tools to ensure private Omni-Channel conversations stay secure. Mayday Communications Inc promotes Verint's complete portfolio of #security solutions. #datacompliance #cybersecurity #gartner #verint"


Our partner Verint has #AI powered tools to ensure private Omni-Channel conversations stay secure. Mayday Communications Inc promotes Verint's complete portfolio of #security solutions. In this newsletter featuring Gartner's report, "Predicts 2019: The Ambiguous Future of Privacy," we dig into steps you can take now to prepare your business for the rising tide of #privacy #regulations..

Putting AI and Machine Learning to Work in IT


Recently I visited with the cybersecurity teams at NTT Communications, British Telecom (BT), and DBS Bank. Each has mature, useful and metrics-driven security solutions. Some of the subtleties of its threat management program are pretty amazing; it feels it can identify characteristics of not only groups of attackers, but actual individuals. BT has an incident response capability that is second to none, driven partly by its interest in combining red team and blue team tactics. These two security teams carefully hone their incident response steps and techniques.

China's drone giant DJI hits back at U.S. security concerns


Another Chinese tech giant is now at the center of national security concerns raised by the U.S. Senate. DJI, a Chinese company that dominates the commercial drone market in the U.S., published an 1800-word letter on Monday striking back against mounting concerns on Capitol Hill over spying, following the recent ban on the Chinese telecom giant Huawei. "The security of a company's products depends on the safeguards it employs, not where its headquarters is located," the Shenzhen-based drone maker said in an open letter to Senators on Monday. During a hearing hosted by Transportation Subcommittee of the Senate Commerce Committee last week, some of the experts testified that they believe that DJI has the potential to send data back to China, which poses serious risks. "American geospatial information is flown to Chinese data centers at an unprecedented level. This literally gives a Chinese company a view from above of our nation. DJI says that American data is safe, but its use of proprietary software networks means how would we know?" said Harry Wingo, Chair of the Cyber Security Department from the National Defense University.

6 Questions About Machine Learning in SIEM (Answered!)


How can this critical capability make or break your overall cybersecurity? And where does machine learning prove insufficient? We answer these questions and other vital inquiries on machine learning in SIEM below! "We are no longer asking the singular question of how we're managing risk and providing security to our organization. We're now being asked how we're helping the enterprise realize more value while assessing and managing risk, security and even safety. The best way to bring value to your organizations today is to leverage automation."