Security & Privacy


Big Data and Analytics – What's Ahead? @ThingsExpo #IoT #M2M #BigData

#artificialintelligence

Recently I read somewhere this statement – As we end 2017 and look ahead to 2018, topics that are top of mind for data professionals are the growing range of data management mandates, including the EU's new General Data Protection Regulation that is directed at personal data and privacy, the growing role of artificial intelligence (AI) and machine learning in enterprise applications, the need for better security in light of the onslaught of hacking cases, and the ability to leverage the expanding Internet of Things. In the area of big data, a combination of new and long-established technologies are being put to work. Hadoop and Spark are expanding their roles within organizations. NoSQL and NewSQL databases bring their own unique attributes to the enterprise, while in-memory capabilities (such as Redis) are increasingly being utilized to deliver insights to decision makers faster. And through it all, tried-and-true relational databases continue to support many of the most critical enterprise data environments.


The Age of AI Surveillance

#artificialintelligence

Your favorite artist is in town for what will undoubtedly be the biggest show of the year. You're at the venue's gates, ready to present your ticket for admission, when you realize you forgot it. No problem, security simply scans your face, and after the camera recognizes you, you're permitted entrance. The Chinese government is searching for a dangerous criminal among its population. A machine goes through hundreds of hours of security camera footage and identifies the right person within minutes.


91% of cybersecurity pros fear hackers will use AI to attack their company

#artificialintelligence

More than 90% of cybersecurity professionals are concerned that hackers will use artificial intelligence (AI) in cyberattacks against their company that are more sophisticated and harder to detect, according to a new report from Webroot. AI has already proven to be both a benefit and a threat on the cybersecurity front: While the technology can help companies fill cybersecurity skills gaps and safeguard data, it also gives hackers a new tool for attack. In August, researchers created an AI that could modify malware to bypass machine learning antivirus software. Common cyberattacks such as phishing also become much more effective when they are powered by AI, according to ZDNet. Webroot surveyed 400 cybersecurity professionals at companies with 100 or more employees in the US and Japan.


How AI will continue its journey into the mainstream in 2018

#artificialintelligence

Artificial intelligence had something of a coming out party in 2017. While some intense sensationalization of AI persisted throughout the year, progress was made to help people understand the realities of AI-driven technologies and applications that guide several aspects of their personal digital lives. The inner workings of AI technologies and how they make decisions, however, remained a black box for many. Here's how I see AI -- and its journey into the mainstream -- evolving in 2018. Sorry, Sophia the Robot, but the AI industry will begin moving away from developing technologies that reside in humanlike physical structures.


Connected car security outfit Upstream Security snags $9m in funding

ZDNet

Upstream Security has secured $9 million in a Series A funding round and plans to use the investment to expand further in the US and Europe. On Wednesday, the company said in a statement that the funding round, led by Charles River Ventures (CRV), includes cash injections from Israeli-based Glilot Capital Partners and Maniv Mobility. The funding builds on a successful seed funding round in June which secured $2 million. Israel-based Upstream Security offers cloud-based security solutions for connected cars to automakers which need to outsource the security aspect of such technologies. The firm uses Big Data, analytics, and machine learning to provide non-intrusive defense against cyberattacks and to detect anomalies which may be malicious behavior.


Artificial Intelligence a "Low Priority" for Healthcare Organizations in 2018

#artificialintelligence

It seems that Artificial Intelligence (AI) is not in the list of 2018 for healthcare organizations; neither it is coming as early as it was expected. More than two-third healthcare organizations are taking Artificial Intelligence as a matter of less priority for the year of 2018. A survey has reported that AI is not coming as fast as many were hoping and foretelling about its arrival. Healthcare organizations are focusing more on developing technologies, cyber security protection and making medicine accuracy by leveraging prognostic analytics than working on artificial intelligence and machine learning. If we imagine the world after implementation of the revolutions like artificial intelligence and machine learning it will ultimately make things easier and better for the healthcare as well as these technologies will be the next driving force of many of these organizations for the things they are working on.


IT TRENDS THAT SHOULD BE TOP OF MIND FOR EVERY CIO

#artificialintelligence

We are entering the third Internet era, and businesses need to be ready for cloud-integrated networks. Cloud integration creates an environment in the organisation that can meet the demands for data, automation of business processes and the anticipated widespread disruption. We offer sound advice on how to keep up with the latest IT trends. BPaaS is a vertical business process that employs a cloud-computing service model. It's growing in popularity as businesses seek to optimise processes with fewer operational costs.


ROBOT exploit from 1998 resurrected, leaves top websites' crypto vulnerable ZDNet

#artificialintelligence

A number of the most popular websites and services online, including Facebook and PayPal, are vulnerable to an exploit which has resurfaced from 1998. The security flaw, dubbed ROBOT, was first discovered almost two decades ago by Daniel Bleichenbacher. PKCS #1 1.5 padding error messages produced by secure sockets layer (SSL) servers allow for an adaptive-chosen ciphertext attack which "fully breaks the confidentiality of TLS when used with RSA encryption," according to researchers Hanno Böck and Juraj Somorovsky from Hackmanit GmbH, Ruhr-Universität Bochum, and Tripwire VERT's Craig Young. The server implementation bug could be used to perform RSA decryption and key signing in order to decrypt traffic. "We discovered that by using some slight variations this vulnerability can still be used against many HTTPS hosts in today's Internet," the team says.


How Machine Learning Can Help Identify Cyber Vulnerabilities

#artificialintelligence

People are undoubtedly your company's most valuable asset. But if you ask cybersecurity experts if they share that sentiment, most would tell you that people are your biggest liability. Historically, no matter how much money an organization spends on cybersecurity, there is typically one problem technology can't solve: humans being human. Gartner expects worldwide spending on information security to reach $86.4 billion in 2017, growing to $93 billion in 2018, all in an effort to improve overall security and education programs to prevent humans from undermining the best-laid security plans. But it's still not enough: human error continues to reign as a top threat.


Five requirements of a leading IoT edge platform - IoT Agenda

@machinelearnbot

Enterprises and the public sector worldwide are looking for ways to increase security, improve productivity, provide higher levels of service and reduce maintenance costs. Many of them are using IoT technologies to improve their critical business processes or to drive innovation across their product lines. According to MachNation forecasts and the IoT Edge ScoreCard 2018, worldwide IoT application enablement revenue will be $1.8 billion in 2017 growing to $64.6 billion by 2026 at a compound annual growth rate of 49%. The IoT is imminent – and so are the security challenges it will inevitably bring. Get up to speed on IoT security basics and learn how to devise your own IoT security strategy in our new e-guide.