Collaborating Authors

Security & Privacy

A Link to News Site Meduza Can (Technically) Land You in Russian Prison


When you run a major app, all it takes is one mistake to put countless people at risk. Such is the case with Diksha, a public education app run by India's Ministry of Education that exposed the personal information of around 1 million teachers and millions of students across the country. The data, which included things like full names, email addresses, and phone numbers, was publicly accessible for at least a year and likely longer, potentially exposing those impacted to phishing attacks and other scams. Speaking of cybercrime, the LockBit ransomware gang has long operated under the radar, thanks to its professional operation and choice of targets. But over the past year, a series of missteps and drama have thrust it into the spotlight, potentially threatening its ability to continue operating with impunity.

Russian shelling leaves 10 Ukrainian civilians dead, 20 injured, Zelenskyy says

FOX News

Fox News Flash top headlines are here. Check out what's clicking on A new barrage of Russian shelling killed at least 10 Ukrainian civilians and wounded 20 others in a day, the office of Ukraine's president said Friday as the country worked to recover from an earlier wave of Russian missile strikes and drone attacks. Regional officials said towns and villages in the east and in the south that are within reach of the Russian artillery suffered most. Six people died in the Donetsk region, two in Kherson, and two in the Kharkiv region.

AI Unleashes its Power to Conquer Cybercrime: A New Era in Cybersecurity


Cybersecurity is a critical issue in today's digital age, as cybercriminals continue to find new ways to infiltrate our systems and steal sensitive information. As the threat of cybercrime looms, it's becoming increasingly clear that traditional cybersecurity methods are no longer enough. But there's hope on the horizon: Artificial Intelligence (AI) is revolutionizing the way we think about cybersecurity and defend against cybercrime. One of the biggest benefits of AI in cybersecurity is its ability to detect and respond to threats in real-time. We all know that traditional cybersecurity methods rely on pre-defined rules and signatures to identify and block malicious activity. But as cybercriminals continue to evolve and find new ways to evade detection, it's becoming clear that this approach is no longer enough.



Traditional ML training requires all training data to reside in a single location, where model training is also executed. This requires transferring huge amounts of data, which can be cost-prohibitive or violate data ownership and privacy/security policies. FML enables organizations to perform model training across disparate data without the need to move it, and protects sensitive information about the data, which for many situations enables previously impossible predictive analytics capabilities. Now ML model training can be distributed across datasets, residing in different locations, such as public and private clouds and on-premise servers. BOSS seamlessly integrates FML functionality into its development workflow, requiring very little additional coding to create and train FML models.

Leaders are meant to keep state secrets. Just not at home.

Associated Press

Democrats responded with aggrieved fury when former President Donald Trump was found in possession of classified documents that should have been turned over to the government when he left office. Then disclosures that President Joe Biden also mishandled secret papers set loose a Republican "well, what about" roar. Now, with another discovery of classified documents, this time at the home of Trump's vice president, Mike Pence, the partisan finger-pointing seems to be melting into a chorus of mortification from Democrats and Republicans. The highest U.S. secrets, it now appears, are not necessarily safe with the highest officials. Not when they're in the hands of Trump, who disdains the rules and customs of government, and not in the hands of Biden and Pence, who subscribe to them.

How to plot a box plot using the pandas Python library? - The Security Buddy


Using a box plot, one can know the spread and skewness of data. It is a standardized way of displaying the five-number summary of the data: The minimum The maximum The median The first quartile or 25th percentile and The third quartile or 75th percentile A box plot usually includes two parts. It includes a […]

UAB cybersecurity program ranked No. 1 - Yellowhammer News


Fortune ranked the University of Alabama at Birmingham's in-person master's degree in cybersecurity as the No. 1 program in the country. According to Fortune, there are nearly 770,000 cybersecurity job openings in the United States. "We are proud to be recognized for academic excellence by Fortune and named the nation's leading institution for graduate studies in cybersecurity," said UAB Provost and Senior Vice President for Academic Affairs Pam Benoit. "UAB's Department of Computer Science has created an outstanding collaborative master's degree program that prepares students to lead careers solving the world's most challenging cybersecurity problems." Fortune's first-ever ranking of in-person cybersecurity master's degree programs compared 14 programs across the United States in three components: Selectivity Score, Success Score and Demand Score.

Staff Data Scientist at Zscaler - San Jose, CA, United States


Zscaler (NASDAQ: ZS) accelerates digital transformation so that customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange is the company's cloud-native platform that protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. With more than 10 years of experience developing, operating, and scaling the cloud, Zscaler serves thousands of enterprise customers around the world, including 450 of the Forbes Global 2000 organizations. In addition to protecting customers from damaging threats, such as ransomware and data exfiltration, it helps them slash costs, reduce complexity, and improve the user experience by eliminating stacks of latency-creating gateway appliances. Zscaler was founded in 2007 with a mission to make the cloud a safe place to do business and a more enjoyable experience for enterprise users.

The ever-evolving world of video content analytics


The world of video analytics has come a long way in the past few years. What started as a complementary security surveillance technology, has evolved into a critical decision-making solution for stakeholders beyond law enforcement and public safety. Powered by AI and deep learning, today's sophisticated video analytics have far-reaching and impactful applications, from accelerating investigations for criminal or commercial claims to increasing operational productivity across industries and end users, delivering cost efficiency, enhanced safety, and elevated experiences. These applications only continue to gain strength, and in this article, I'll walk you through some examples of diverse industries innovatively supporting operational and business decision making with the power of data-driven intelligence derived from video analytics. But first, a quick word on how it works: Video intelligence software detects and extracts objects in video, identifies each object based on trained Deep Neural Networks, and classifies each object to enable intelligent video analysis through search and filtering, alerting, data aggregation, and visualisation capabilities.

11 Key Information Governance Trends -- Perspectives


Key trend #1 -- Migration to the cloud will accelerate, although the rising scale of cloud costs will become increasingly scrutinized by finance types as the economy tightens. Organizations will struggle with hybrid and multi-cloud architectures. Watch for new and innovative pricing schema to help combat the rising costs (e.g., fee caps and fixed fee). The flexibility and scalability the cloud offers to organizations. Cloud computing allows companies to easily add or remove resources as needed, without having to invest in expensive hardware and infrastructure.