The US Army will soon send teams of cyber warriors to the battlefield, officials said Wednesday, as the military increasingly looks to take the offensive against enemy computer networks. While the Army's mission is generally to'attack and destroy,' the cyber troops have a slightly different goal, said Colonel Robert Ryan, who commands a Hawaii-based combat team. How can I influence by non-kinetic means? How can I reach up and create confusion and gain control?' he told reporters. The US Army will soon send teams of cyber warriors to the battlefield, officials said Wednesday, as the military increasingly looks to take the offensive against enemy computer networks.
More than 90% of cybersecurity professionals are concerned that hackers will use artificial intelligence (AI) in cyberattacks against their company that are more sophisticated and harder to detect, according to a new report from Webroot. AI has already proven to be both a benefit and a threat on the cybersecurity front: While the technology can help companies fill cybersecurity skills gaps and safeguard data, it also gives hackers a new tool for attack. In August, researchers created an AI that could modify malware to bypass machine learning antivirus software. Common cyberattacks such as phishing also become much more effective when they are powered by AI, according to ZDNet. Webroot surveyed 400 cybersecurity professionals at companies with 100 or more employees in the US and Japan.
People are undoubtedly your company's most valuable asset. But if you ask cybersecurity experts if they share that sentiment, most would tell you that people are your biggest liability. Historically, no matter how much money an organization spends on cybersecurity, there is typically one problem technology can't solve: humans being human. Gartner expects worldwide spending on information security to reach $86.4 billion in 2017, growing to $93 billion in 2018, all in an effort to improve overall security and education programs to prevent humans from undermining the best-laid security plans. But it's still not enough: human error continues to reign as a top threat.
Enterprises and the public sector worldwide are looking for ways to increase security, improve productivity, provide higher levels of service and reduce maintenance costs. Many of them are using IoT technologies to improve their critical business processes or to drive innovation across their product lines. According to MachNation forecasts and the IoT Edge ScoreCard 2018, worldwide IoT application enablement revenue will be $1.8 billion in 2017 growing to $64.6 billion by 2026 at a compound annual growth rate of 49%. The IoT is imminent – and so are the security challenges it will inevitably bring. Get up to speed on IoT security basics and learn how to devise your own IoT security strategy in our new e-guide.
A USA TODAY motion graphic explaining the steps hackers use to take down servers. A graphic representation of the dangers posed by botnets, stealth robotic computer networks that place malicious hardware on the computers of unsuspecting users. SAN FRANCISCO -- A New Jersey man has pleaded guilty to computer crimes charges for an online attack that caused a massive Internet outage last year, according to federal court documents unsealed Tuesday. The Justice Department says Paras Jha built the Mirai botnet, which operated hundreds of thousands of infected household devices to flood websites with traffic, knocking out services such as Netflix and PayPal. The plea agreement was filed Dec. 5 in federal court in Alaska.
Nov. 21, 2017 -- ERPScan, the most innovative ERP cybersecurity provider, announces the release of the first and only AI-driven SAP cybersecurity platform at "Cybersecurity for SAP Customers" conference in Las Vegas. The new platform leverages Machine Learning and Deep Learning to provide predictive, preventive, detective and responsive capabilities thus covering all aspects of SAP Security in one platform. Gartner predicted, "Through 2022, AI will be a major battleground for technology leadership," and we already started to drive it . While cyberattacks are looming large over enterprises, it is inappropriate to rely on the detection and patching of vulnerabilities alone but crucial to detect any potential attack. Business applications are customized in the way that building the signature-based threat detection is ineffective, and, as a matter of fact, traditional approaches can hardly help.
Despite growing investments in defensive technologies, cyber breaches continue to proliferate. In a world where malware is continually evolving, critical data is moving to the cloud, and criminals are exploring new vectors of attack, how can security professionals stay up to date with, and keep ahead of, changes in the industry? In the Forcepoint 2018 Predictions, our security experts and Labs professionals will examine eight different areas of concern for year ahead. Here we examine five predictions for 2018. The web is moving to encrypted-by- search engines, social media networks and shopping sites are investing in the technology to make the web a safer place for everyone.
Jack Danahy is the co-founder and CTO of Barkly, an endpoint protection platform that is transforming the way businesses protect endpoints. A 25-year innovator in computer, network and data security, Jack was previously the founder and CEO of two successful security companies: Qiave Technologies (acquired by Watchguard Technologies in 2000) and Ounce Labs (acquired by IBM in 2009). Jack is a frequent writer and speaker on security and security issues, and has received multiple patents in a variety of security technologies. Prior to founding Barkly, he was the Director of Advanced Security for IBM, and led the delivery of security services for IBM in North America.
AR/VR startup Magic Leap's new patent application links facial recognition, identity authentication, and document verification and could signal the stealth company's interest in cybersecurity applications. Magic Leap – a much-hyped "mixed reality" startup that has raised almost $2B to date – has yet to release a product. But with investors like Google, Kleiner Perkins, Alibaba, and others betting big on Magic Leap's success, the company's mysterious ambitions have captivated interest across the tech sector. A new patent application surfaced in the CB Insights database is the latest clue to the stealth startup's strategy: The technology outlined in the patent could turn an augmented reality system into a tool for hyper-rapid identity verification using facial recognition. Get this data driven report on the patent activity for Google, Facebook, Microsoft, Amazon and more top tech companies.
According to the Financial Conduct Authority (FCA), financial services firms and banks in the UK are not reporting successful cyber attacks. Indeed, Megan Butler – director of the FCA – confirmed that banks are still not admitting the full scale of cyber attacks carried out every day. In response to this news, cyber security expert Simon Bain from BOHH Labs, has challenged regulators and banks to adopt innovative technology such as artificial intelligence and machine learning in order to minimise the threat of cybercrime. Earlier this year, Nick Cook, the FCA's head of data and information operations, said that the regulator was "still learning" how to support the adoption of automated, digitised compliance. The FCA reports that the number of successful cyber attacks has risen from 5 to 49 annually between 2014 and 2017.