Collaborating Authors

Security & Privacy

IT Leaders Consider Security Tech a Part of Business Transformation


With new threats disrupting business operations and an increasingly strict regulatory environment, security is no longer a risk mitigation activity or a growth inhibitor. Rather, information security is increasingly being viewed as strategic business enabler for the enterprise. That is evident in IDG's 2022 State of the CIO Survey, where IT leaders and line of business (LOB) executives were asked which technologies they expected to have the greatest effect on how their company functions over the next few years. While the respondents list the usual suspects – big data/analytics, AI/machine learning, and cloud infrastructure – in the top 3, 19% say identity and access management has the most potential to significantly impact business operations. In a distributed world, identity and access management (IAM) is instrumental in managing security in a cloud-based world, which makes its placement between cloud infrastructure and cloud databases (picked by 17% of respondents) appropriate.

Artificial intelligence, real flavor


On today's show: • Donna Shore and Colleen Sisk of Lena's Wood-Fired Pizza and The Loft at Lena's Seasonal Dining Experience; • Bryce Iapicca, director of operations, Puro Gusto, Washington, D.C., an authentic all-day Italian café based on the habits and rituals of the Italian people, from breakfast'til before dinner time. That is, from a quick morning coffee to a leisurely sit-down lunch to a sophisticated cocktail at the end the day; • Makenna Held, owner of The Courageous Cooking School, housed in what was Julia Child's La Pitchoune home in France .We chat about its culinary approach to a recipe-free way to learn to cook French and farm-to-table cuisine; Katerina Axelsson is the 30-year-old founder and CEO of Tastry, a California sensory sciences company. Tastry is an artificial intelligence and data insights company that predicts how consumers will perceive any product you can taste or smell. Tastry "taught a computer how to taste" and built the most sophisticated sensory product and consumer database to answer questions current technology could not answer. John Henry, operations officer of the USCG Cyber Command, discusses how the Command prepares for and responds to cyber incidents.

Top 3 Chatbot Security Vulnerabilities in 2022 - DZone AI


This vulnerability is actually easy to defend by validating and sanitizing user input, but still, we are seeing this happening over and over again. Security testing should be part of your continuous testing pipeline. The earlier in the release timeline a security vulnerability is identified, the cheaper the fix is. Basic tests based on the OWASP top 10 should be done on API level as well as on end-to-end level. Typically, defense against SQL Injections is tested best on API level (because of speed), while defense against XSS is tested best on the end-to-end level (because of Javascript execution).

5 Reasons Businesses Should Use RPA to Improve Their Processes


Hannah Wilson with PSTG says the virtual workforce that comes with robotic process automation (RPA) can streamline processes and improve data security.

US taxpayers will have to submit a video selfie to access their IRS accounts

Daily Mail - Science & tech

The selfie is taken on a mobile device and then uploaded, a third-party identity verification company that will use its own facial recognition to verify the individual US taxpayers will have to submit a video selfie to access certain Internal Revenue Service (IRS) tools and applications starting this summer. The selfie is taken on a mobile device and then uploaded to, a third-party identity verification company that will use its own facial recognition to verify the individual. Once verified, the taxpayer will be asked to upload their government ID and copies of bills. Users can access basic information on the IRS without logging into, but the unique sign in will be required to make and view payments, access tax records, view or create payment plans, manage communications preference or view tax professional authorizations. However, this process is not a requirement to file taxes.

Simulation Tech Can Help Predict the Biggest Threats


The character of conflict between nations has fundamentally changed. Governments and militaries now fight on our behalf in the "gray zone," where the boundaries between peace and war are blurred. They must navigate a complex web of ambiguous and deeply interconnected challenges, ranging from political destabilization and disinformation campaigns to cyberattacks, assassinations, proxy operations, election meddling, or perhaps even human-made pandemics. Add to this list the existential threat of climate change (and its geopolitical ramifications) and it is clear that the description of what now constitutes a national security issue has broadened, each crisis straining or degrading the fabric of national resilience. Traditional analysis tools are poorly equipped to predict and respond to these blurred and intertwined threats.

La veille de la cybersécurité


This technology is applied in many different ways. One of these is in the boosting of cyber security, an issue that has become quite sensitive over the past few years. Cyber security can lead to the complete failure of an organization, especially if crucial data is lost to the competition. Customers are also likely to abandon a company if it develops a reputation for poor cyber security. So, how exactly can companies use machine learning to boost customer security?

Facial recognition taken to court in India's surveillance hotspot

Al Jazeera

It was lockdown in the Indian city of Hyderabad when activist S Q Masood was stopped on the street by police who asked him to remove his face mask and then took his picture, giving no reason and ignoring his objections. Worried about how the photographs would be used, Masood sent a legal notice to the city's police chief. But after receiving no response, he filed suit last month over Telangana state's use of facial recognition systems – the first such case in India. "Being Muslim and having worked with minority groups that are frequently targeted by the police, I'm concerned that my photo could be matched wrongly and that I could be harassed," Masood, 38, told the Thomson Reuters Foundation. "It is also about my right to privacy, and my right to know why my photograph was taken, what it will be used for, who can access it, and how it's protected. Everyone has a right to know this information," he said.

5 ways AI and ML will improve cybersecurity in 2022


Did you miss a session from the Future of Work Summit? Cyberattacks are happening faster, targeting multiple threat surfaces simultaneously using a broad range of techniques to evade detection and access valuable data. A favorite attack strategy of bad actors is to use various social engineering, phishing, ransomware, and malware techniques to gain privileged access credentials to bypass Identity Access Management (IAM) and Privileged Access Management (PAM) systems. Once in a corporate network, bad actors move laterally across an organization, searching for the most valuable data to exfiltrate, sell, or use to impersonate senior executives. IBM found that it takes an average of 287 days to identify and contain a data breach, at an average cost of $3.61M in a hybrid cloud environment.

Trends that will shape the security industry in 2022 - Help Net Security


Entering 2022, the world continues to endure the pandemic. But the security industry has, no doubt, continued to shift, adapt, and develop in spite of things. Several trends have even accelerated. Beyond traditional "physical security," a host of frontiers like AI, cloud computing, IoT, and cybersecurity are being rapidly pioneered by entities big and small in our industry. By all appearances, the security industry is in a stage of redefining itself.