Security & Privacy


AU10TIX a global cloud-based, machine learning, ID verification and authentication platform, joins the FIDO Alliance

#artificialintelligence

NICOSIA, Cyprus, March 31, 2020 /PRNewswire-PRWeb/ -- AU10TIX, a global cloud-based, machine learning, ID verification, and authentication platform, recently joined the FIDO Alliance. The FIDO Alliance is a cross-industry coalition developing open, interoperable authentication standards that reduce reliance on passwords with authentication that is more secure, private, and easier to use. "Providing safer and compliant solutions, requires us to be at the forefront of global and local regulation while shaping future policies," said Carey Kolaja, President and Chief Operating Officer, AU10TIX. "AU10TIX is certified under ISO/IEC standard, adheres to SOC and CCPA, and is compliant with GDPR. Our vision is to protect consumer identities by creating secure and seamless transactions for our partners and their customers. Trust is critical as we become more globally-connected, and by joining the FIDO Alliance, we will work alongside industry leaders to directly influence the development of standards that will enable leading businesses to build trust, creating a more inclusive and secure world."


Blue Prism Teams Up with SailPoint to Deliver New Security Capabilities

#artificialintelligence

Looking to extend its industry leading security capabilities, Blue Prism announced a partnership with SailPoint, a market leader in enterprise identity management. This partnership gives enterprises added visibility and transparency into governing digital workers, resulting in improved compliance reporting, full automation lifecycle management and better security. The integration of Blue Prism's connected-RPA platform with SailPoint helps organizations maintain and control credentials of digital workers, including those that meet defined Separation of Duties (SoD) policies. By maintaining these credentials and granting access through SailPoint, digital workers can execute systems-based tasks, just as their human counterparts do, securely and at scale. This ability to disable or delete credentials quickly and accurately, while monitoring and auditing access, gives enterprises improved compliance reporting and full lifecycle management and security.


Could AI Security Prevent Hacks?

#artificialintelligence

Las Vegas hacking event, the Cyber Grand Challenge was the ultimate, and only, all-machine hacking competition. Each machine identified software vulnerabilities, exploited them and patched their own systems to protect against threats -- all without a human programmer intervening. This article explains the role of automation in IT security and how it could address the skills shortage. We've all heard of the wider IT skills shortage, but the lack of security skills in the industry is even more critical. According to a report by the Life and Times of Cybersecurity Professionals, IT workers that have specialist cyber security skills are approached with a new job offer at least once a week.


IoT-Based DDoS Attacks Are Growing and Making Use of Common Vulnerabilities

#artificialintelligence

Internet of Things (IoT) devices have been the primary force behind the biggest distributed denial of service (DDoS) botnet attacks for some time. It's a threat that has never really diminished, as numerous IoT device manufacturers continue to ship products that cannot be properly secured. A10 Networks, a leading application delivery controller manufacturer, has been keeping tabs on DDoS attacks around the globe for several years now. The company's quarterly State of DDoS Weapons Report provides a very useful snapshot of the current activity and threat level. The recently-published report for the fourth quarter of 2019 is noteworthy in identifying some new trends that are amplifying DDoS attacks, including a common vulnerability in the WD-Discovery protocol that is being widely exploited and the use of autonomous number systems (ANS) to track attacks back to their source.


Banking Bots: The Good, The Bad And The Ugly

#artificialintelligence

Digital fraud continues to flourish, with recent surveys finding that security breaches have increased 67 percent since 2014 and 11 percent since 2018. Casualties of these breaches in the first half of 2019 alone include 4.1 billion personal records exposed in a variety of ways: 52 percent through hacking; 33 percent via phishing; and 32 percent through social engineering, with many involving more than one method. Organizations and security developers are investing billions of dollars in fighting these fraud attempts. Worldwide spending on security systems is projected to hit $131 billion by the end of 2020, and $174 billion over the next two years. Artificial intelligence (AI) and machine learning (ML) applications often form the core of these cybersecurity systems and are being deployed across banks, retailers, telecommunications companies and many other businesses.


5 Things You Must Add to Your Incident Response Plan in 2020

#artificialintelligence

The purpose of an IRP is to standardize and facilitate effective incident response and minimize damage caused by incidents. In this article, you'll learn what are the key considerations when creating an IRP, and what components to include in the plan. Creating an effective incident response plan requires significant time and effort but can greatly improve the security of your systems and data. Threats are constantly evolving as attackers attempt to find new ways to bypass security measures and infiltrate systems. This evolution requires organizations to consistently and reliably update their IRPs.


DARPA Considers AI to Protect Electric Grid, Advance 5G – MeriTalk

#artificialintelligence

As the Defense Advanced Research Projects Agency (DARPA) continues exploring emerging technologies for the Department of Defense, it's considering the implementation of artificial intelligence (AI) to tackle electric grid cybersecurity and get ahead of 5G deployment. "In the area of cyber operations, we have a program RADICS [Rapid Attack Detection, Isolation and Characterization Systems], which is designed to help recover critical portions of the power grid in the event of a full blackout caused by malware," Scherlis explained. The program partners with power companies, the National Guard, the Department of Homeland Security, and the Department of Energy to enable a "black start" recovery, a restart to the electric grid without external power, in the event of a cyberattack. Scherlis mentioned the program in context of AI, but the program is generally building new tech to accelerate recovery through improved situational awareness, network isolation, and the ability to adapt to changing cyber situations. "The idea of this program is how can we understand what is the state of affairs in the grid and incrementally restore service, purge the malware, and bring service back to the most critical assets and then stage that out beyond. They've done a number of field trials," Scherlis added.


With cyberattacks becoming more common security now needs to take priority

#artificialintelligence

The last 12 months has seen multiple industries put an increasing amount of emphasis on digital transformation, with more businesses beginning to experiment and deploy new smart tools and workflow solutions, which has led to faster information sharing, increased productivity and the automation of repetitive, mundane tasks. But the cybersecurity attacks that took place in 2019 have made companies reconsider their strategies with security now becoming more prominent. The last 12 months saw a number of huge high-profile hacking and cybersecurity attacks across a range of sectors, including Toyota's data breach that exposed the details of 3.1 million customers. Incidents like this have made organisations increasingly conscious about their security models, with many now looking to improve their security systems, but how can they achieve this? As companies continue to adopt smarter and integrated workflow solutions, the security of the entire system must be considered.


With cyberattacks becoming more common security now needs to take priority

#artificialintelligence

The last 12 months has seen multiple industries put an increasing amount of emphasis on digital transformation, with more businesses beginning to experiment and deploy new smart tools and workflow solutions, which has led to faster information sharing, increased productivity and the automation of repetitive, mundane tasks. But the cybersecurity attacks that took place in 2019 have made companies reconsider their strategies with security now becoming more prominent. The last 12 months saw a number of huge high-profile hacking and cybersecurity attacks across a range of sectors, including Toyota's data breach that exposed the details of 3.1 million customers. Incidents like this have made organisations increasingly conscious about their security models, with many now looking to improve their security systems, but how can they achieve this? As companies continue to adopt smarter and integrated workflow solutions, the security of the entire system must be considered.


How to Treat the Data Economy Like a Utility - The WorldPost - Berggruen Institute

#artificialintelligence

Yakov Feygin is the associate director of the Future of Capitalism program at the Berggruen Institute. The rise of the "data economy" rightly makes people nervous. From political propaganda to scandals involving personal data, companies like Google, Apple, Facebook and Amazon have not exactly covered themselves with glory. Politicians and others have grown more and more concerned about how the data economy is becoming monopolistic and exploiting workers, and several Democratic presidential candidates have proposed using the tools of monopoly regulation to break up the Silicon Valley giants. These efforts are commendable but ironically may not be ambitious enough.