The Top 10 Israeli Artificial Intelligence Startups - Nanalyze


Founded in 2007, Cortica has taken in total of funding of $69.4 million total funding to develop "the world's only unsupervised learning system capable of human level image understanding." Founded in 2012, Fortscale has taken in $39 million in total funding to develop User & Entity Behavioral Analytics (UEBA) which identifies "internal threats" to your business using machine learning algorithms. With $22 million in funding from investors that include Qualcomm and Cisco, Prospera has developed computer vision technologies that continuously monitor and analyze plant health, development and stress. We've recently written about more than 20 medical imaging startups, and one of those articles about "9 Artificial Intelligence Startups in Medical Imaging" featured Zebra Medical Vision which has taken in $20 million in funding so far and claims to have accumulated "one of the largest anonymized databases of medical imaging and clinical data available."

How Machine Learning and Artificial Intelligence Are Shaping Cybersecurity - Indusface Blog


According to the 2016 Data Incident Response Report, human error is still to blame for most security breaches. In order to stop complex attacks, thousands of pieces of ever-changing data and anomalies need to be quickly analyzed in order to find potential incidents. Artificial intelligence and machine learning can rapidly and efficiently detect threats, resolve them, and prevent them in the shortest amount of time possible with the greatest potential for resolution. And because the landscape of hacking technology and cybersecurity best practices is constantly changing, it requires that type of rapid learning to make sure your business stays safe.

3 Ways AI Could Help Resolve the Cybersecurity Talent Crisis


But while it's true that companies face significant competition to land qualified security employees, it's myopic to argue there's not enough talent out there. As the need for security roles expands, organizations across industries will face growing pressure to hire qualified security professionals. A Deeper Cybersecurity Crisis As a May CompTIA study revealed, the cybersecurity skills gap is a growing problem, but few companies are proactively addressing the issue. Using AI to Fight the Talent Crisis As businesses struggle to fill crucial cybersecurity roles, they should consider turning to AI-driven tools to help solve the problem.

Artificial intelligence cyber attacks are coming – but what does that mean?


So, unlike in the movies, the capabilities AI could bring to cyberattacks – and cyberdefense – are not likely to immediately involve computers choosing targets and attacking them on their own. It may result in a programming and technological arms race, with defenders developing AI assistants to identify and protect against attacks – or perhaps even AI's with retaliatory attack capabilities. Operating autonomously could lead AI systems to attack a system it shouldn't, or cause unexpected damage. But as we continue to fill our homes, factories, offices and roads with internet-connected robotic systems, the potential effects of an attack by artificial intelligence only grows.

The Future Role of A.I. in the Military


The researchers examined nuclear, aerospace, cyber and biotech opportunities to develop recommendations for national security policy involving A.I .funding In the report, Admiral Mike Rogers, the director of the National Security Agency and Commander of U.S. Cyber Command, explained why he is confident that the future of cybersecurity will involve A.I. "Initially, technological progress will deliver the greatest advantages to large, well-funded and technologically sophisticated militaries, just as Unmanned Aerial Vehicles and Unmanned Ground Vehicles did in U.S. military operations in Iraq and Afghanistan. "ISIS is making noteworthy use of remotely-controlled aerial drones in its military operations," the report states. A.I.-enabled technology-- including long-range drone package delivery-- could give weaker states and non-state actors, including terrorist organizations, access to a type of long-range precision strike capability.

Cyber security and the future model IOL Business Report


He made an example of the current cyber threat landscape and showed the impact global threats had on Africa. He added, "It will take a concerted effort from both private and public sectors to fight cyber-crime and improve cyber security so that Africa's cybersecurity landscape can reach optimally contend with global standards." This means that it is not only more powerful, intuitive and automated, but also more accessible, with companies offering software solutions that are now affordable for small to medium sized businesses - sometimes they're even free," "Acumatica is a post-modern, true-cloud business system that takes advantage of the following trending technologies: blockchain security, IoT, artificial intelligence, multi-cloud and natural language interface to ERP," Ford explained. We shared valuable industry insights and knowledge, addressing the latest developments in cyber security as faced by financial institutions, with particular emphasis on cyber resilience, cyber security culture, and the protection of critical financial infrastructure, as well as risk mitigation strategies," he concluded.

WA pledges AU$17m for high-tech sector


"With an increasing national focus on counter-terrorism, cybersecurity, and emergency management, the department will continue to provide advice to the premier on state security and emergency management matters, and coordinate the state's involvement in the national counter-terrorism and emergency management arrangements," it said. The Lotteries Commission is also getting AU$5.3 million in 2017-18 to replace its technology and develop an online system; AU$3 million for its software and gaming systems; and AU$2.7 million for operating system upgrades and supporting environments. "The digitisation of the open and active operational files will reduce process timeframes on determinations and land actions, streamline business processes, ensure business continuity, enable integration with the Integrated Workflow Management System (iWMS), and address risks associated with the reliance on paper-based files," it said. The Insurance Commission of Western Australia has been allocated AU$19.7 million in funding for its Asset Investment Program, which involves new IT hardware replacing network and server infrastructure, desktop workstations, storage, IT security, enhanced disaster recovery capability, and imaging and workflow facilities.

IBM and MIT to launch $240m Watson Artificial Intelligence Lab


IBM and the Massachusetts Institute of Technology (MIT) have joined forces to establish an MIT-IBM Watson AI Lab in Cambridge that will pursue research in artificial intelligence (AI) with a focus on healthcare and cybersecurity, as well as on commercialising AI technologies born out of the lab. In addition to IBM's plan to commercialise technologies developed within the lab, the pair will encourage MIT faculty and students to launch new companies that will focus on commercialising inventions and technologies that are developed at the lab. In addition, IBM and the Broad Institute of MIT and Harvard recently established a five-year, $50 million research collaboration on AI and Genomics. The new Watson AI Lab will be co-chaired by IBM Research VP of AI and IBM Q Dario Gil and Anantha P Chandrakasan, dean of MIT's School of Engineering.

Integrating Artificial Intelligence into Cybersecurity: Protecting IP, Data, and Networks with AI


While vendors can't control the bad actors, they can certainly use every resource at their disposal to minimise the threat landscape and protect at-risk networks. And, increasingly, those resources revolve around both threat intelligence and artificial intelligence. And Fortinet continues to innovate new advanced tools to help detect, mitigate, and prevent fast-moving threats. In our next post we'll talk about some of the other innovations that organisations can use to protect their IP resources against a growing threat landscape and increasingly determined cybercriminals.