Goto

Collaborating Authors

Security & Privacy


During this COVID-19 Thanksgiving, have an after-dinner video gathering

USATODAY - Tech Top Stories

Maybe you won't be physically together with family or friends this Thanksgiving, but you can still gather – virtually. You could all eat dinner at the same time while connected on Zoom or on other video services. Instead of that traditional trip to the theater after dinner, you can hang out watching a movie or your favorite TV series online. Many streaming services have created special ways to watch together, but you can strategize your own way to be connected and have a movie viewing. You want to connect safely, making sure the apps you use to congregate don't come with pitfalls.


Biden names John Kerry climate czar, in a recommitment to global cooperation

MIT Technology Review

President-elect Joe Biden named John Kerry to the newly created role of climate czar, a move that underscores the incoming administration's commitment to an international-focused approach to the issue and recognition of its strategic importance. Kerry, the former secretary of state, is a diplomatic heavyweight who helped piece together the landmark Paris climate agreement during the Obama administration and pushed hard for domestic climate policies as a US senator. "I've asked him to return to government to get America back on track to address one of the most urgent national security threats we face--the climate crisis," Biden said in a statement released on Monday. "This role is the first of its kind: the first cabinet-level climate position, and the first time climate change has had a seat at the table on the National Security Council." Kerry's appointment as "special presidential envoy for climate" is among the first of six cabinet-level nominations that the Biden team announced on Monday, as it works to form a government in spite of President Donald Trump's refusal to accept the results of the election.


Exploiting AI: How Cybercriminals Misuse and Abuse AI and ML

#artificialintelligence

Artificial intelligence (AI) is swiftly fueling the development of a more dynamic world. AI, a subfield of computer science that is interconnected with other disciplines, promises greater efficiency and higher levels of automation and autonomy. Simply put, it is a dual-use technology at the heart of the fourth industrial revolution. Together with machine learning (ML) -- a subfield of AI that analyzes large volumes of data to find patterns via algorithms -- enterprises, organizations, and governments are able to perform impressive feats that ultimately drive innovation and better business. The use of both AI and ML in business is rampant.


iot ai_2020-11-18_04-34-51.xlsx

#artificialintelligence

The graph represents a network of 2,713 Twitter users whose tweets in the requested range contained "iot ai", or who were replied to or mentioned in those tweets. The network was obtained from the NodeXL Graph Server on Wednesday, 18 November 2020 at 12:51 UTC. The requested start date was Wednesday, 18 November 2020 at 01:01 UTC and the maximum number of tweets (going backward in time) was 7,500. The tweets in the network were tweeted over the 4-day, 14-hour, 40-minute period from Friday, 13 November 2020 at 10:20 UTC to Wednesday, 18 November 2020 at 01:01 UTC. Additional tweets that were mentioned in this data set were also collected from prior time periods.


Applications of Differential Privacy to European Privacy Law (GDPR) and Machine Learning

#artificialintelligence

Differential privacy is a data anonymization technique that's used by major technology companies such as Apple and Google. The goal of differential privacy is simple: allow data analysts to build accurate models without sacrificing the privacy of the individual data points. But what does "sacrificing the privacy of the data points" mean? Well, let's think about an example. Suppose I have a dataset that contains information (age, gender, treatment, marriage status, other medical conditions, etc.) about every person who was treated for breast cancer at Hospital X.


How AI Can Make Cybersecurity Jobs Less Stressful and More Fulfilling

#artificialintelligence

Words for health and the human body often make their way into the language we use to describe IT. Computers get viruses; companies manage their security hygiene; incident response teams train on their cyber fitness. Framing IT concepts in terms of health can also be useful when looking at security operations centers (SOCs) and jobs in cybersecurity. For many businesses and other entities today, SOCs are not the healthiest they could be. Jobs in cybersecurity can be stressful and overwhelming due to the volume of alerts.


A Scoville Heat Scale For Measuring The Progress Of Emerging Technologies In 2021

#artificialintelligence

The cognitive technologies AI & ML also have quite a hot measurement on the Scoville pepper scale. AI & ML are not necessarily new innovations, but they are ones that still have yet to reach full potential. In 2020, both AI & ML started to flourish -- and it will continue to do so throughout 2021. At its core, AI & ML are really about data integration, quality (image definition) and collection and processing of that data that allows for meaningful analytics. Applications for AI are increasing in variety and capability (especially automation) and are now being applied to almost every industry vertical, including finance, healthcare, energy, transportation, and cybersecurity. Most intriguing, but only in the earliest stages is AL/ML neural human augmentation. Neuromorphic technologies, and human/computer interface will extend our human brain capacities, memories and capabilities.


AI and Cybersecurity: What's the deal

#artificialintelligence

Artificial intelligence is probably the future of security software regarding how many processes it can improve and how little resources it requires. Positively, it will be integrated into the advanced antivirus programs and take on more and more features. Although not all the antiviruses have AI integrated, it is still essential to protect personal gear and information from intruders and hacker attacks. If you need to find a porter antivirus, read professional and common user reviews. This way, you'll be able to see how good is AVG antivirus, Avast, or any other one, before AI can handle all the security processes. So, for starters, artificial intelligence can be classified into two types.


AI, 5G, and IoT will be the most important tech of 2021, IT leaders say

#artificialintelligence

With more organizations and professionals relying on remote working technologies, there has been an increase in cybercrime during the global pandemic. Understandably, CIOs and CTOs have concerns when it comes to cybersecurity, their two biggest challenges being workers using their own devices at work (37%) and securing the Internet of Things (35%). However, just 34% of respondents said they were capable of tracking and managing between 26-50% of the connected devices used in their organizations, and just 20% said they could do this for 51-75% of IoT devices. Elsewhere in the survey, CIOs and CTOs provided a glimpse into their biggest priorities since the outbreak of coronavirus at the start of 2020. It found that IT leaders are quickly adopting cloud computing (55%), 5G (52%), as well as AI and machine learning (51%) in response to the pandemic.


AI could be the next big defence against cybercrime

#artificialintelligence

The future of corporate cybersecurity seems to lie in artificial intelligence (AI) and machine learning (ML) solutions, a new report from global IT company Wipro suggests. According to Wipro's annual State of Cybersecurity Report (SOCR), almost half (49 percent) of all cybersecurity-related patents filed in the last four years have centered on AI and ML application. Almost half of the 200 organizations that participated in the report also said they are expanding cognitive detection capabilities to tackle unknown attacks in their Security Operations Centers (SOC). From a global perspective, one of the main threats for organizations in the private sector seems to be potential espionage attacks from nation-states. Almost all (86 percent) cyberattacks that came from state-sponsored actors fall under the espionage category and almost half (46 percent) of those attacks targeted the private sector.