Goto

Collaborating Authors

Hacking Blockchains: Major Cybersecurity Attack Vulnerabilities To Be Mindful For

@machinelearnbot

The relationship between the internet and the countless millions of users that make up its population and all of the information they share have a, less than positive relationship with those that want access to that information. Much like the relationship between criminals and cops; the relationship is based on constant escalation to find or resolve a weakness. And in the current state of affairs, the internet, with all of its users and companies, is in no position to patch holes rapidly in comparison to those actively looking to break through them. As much as we'd like to think that the race for cybersecurity is a near-run one. The reality is far more unsettling for those considering they are safe on a system that is proving to be increasingly outdated.


Cybersecurity Predictions for 2019 - SmartData Collective

#artificialintelligence

Cybersecurity is a concern for organizations of all sizes. The Bureau of Labor Statistics predicts that by 2026 information security analyst jobs will increase by 28%. So, it should come as no surprise that everyone is interested in what cybersecurity is going to bring in 2019. SPOILER Alert: The current threats in cybersecurity are going to continue to grow. Here are the big predictions for the year ahead.


NIST Releases Cybersecurity Report on the Internet of Things

#artificialintelligence

NIST's Interagency International Cybersecurity Standardization Working Group has released its interagency report on cybersecurity standards for the Internet of Things, and it is inviting draft comments from agencies.


The Cybersecurity Maturity Model: A Means To Measure And Improve Your Cybersecurity Program

#artificialintelligence

To truly be effective, a cybersecurity program must continually evolve and improve. The problem is, many organizations don't have a clear sense of where they are today and how to improve for tomorrow. As Peter Drucker, the father of management, is often quoted as saying, "If you can't measure it, you can't improve it." In an effort to validate and measure their efforts, many cybersecurity organizations count the number of vulnerabilities they've closed in a given time period or report compliance with regulatory or industry standards. However, none of these approaches gives a true indication of your organization's maturity, nor do they provide a framework for improvement.


6 AI Cybersecurity Startups to Watch in 2018 - Nanalyze

#artificialintelligence

If 2017 has taught us anything, it's that nothing is safe. Some poor MBA home alone for the holidays is probably still crunching the final numbers, but this year will likely turn out to be one of the worst in terms of cybersecurity breaches. Almost two billion records were lost or stolen globally in the first half of 2017. The Equifax breach was probably the most infamous, but there were plenty of other headline-grabbing cyber attacks, including the use of hacking tools developed by the National Security Agency. Storing private data on post-it notes taped around a computer monitor seems like a more secure choice these days.