Collaborating Authors


Remote Cloud network Engineer openings in Austin, United States on August 15, 2022 – Cloud Tech Jobs


Required Skills/Abilities/Profile: • Mandatory 3 years of demonstrated hands-on experience designing and implementing AWS core infrastructure components including expert level CLI experience with IAM, S3, EC2, VPC, ELB, Route 53, DynamoDB, RDS, Elasticache, and other core AWS products.

SPB 2022 Q2 Artificial Intelligence & Biometric Privacy Quarterly Review Newsletter


Q2 did not disappoint in the AI and biometric privacy space, with a number of noteworthy litigation, legislative, and regulatory developments having taken place in these two rapidly developing areas of law. Read on to see what has transpired over the last quarter and what you should keep your eyes on as we head into the second half of 2022. As many familiar with BIPA know, currently pending before the Illinois Supreme Court is Cothron v. White Castle System, Inc. (covered extensively by SPB team member Kristin Bryan in CPW articles here, here, here, and here), which is set to provide much-needed certainty regarding the issue of claim accrual in BIPA class action litigation. "Claim accrual" involves when a claim "accrues" or occurs--either only at the time of the first violation or, alternatively, each and every time a defendant violates Illinois's biometric privacy statute. If the Cothron Court rules that BIPA violations constitute separate, independent claims, then the associated statutory damages of $1,000 to $5,000 per violation would compound with each successive failure to comply with Illinois's biometric privacy law.

Citi Veteran Carl Froggett Joins Deep Instinct as Chief Information Officer


Froggett to support accelerating growth and continued international expansion. Froggett was formerly Head of Global Infrastructure Defense, CISO Cybersecurity Services at Citi. In his previous role, Carl was responsible for delivering integrated risk reduction capabilities and services aligned to the architectural, business, and CISO priorities across Citi's devices and networks in 100 countries. Since 1998, he has held various regional and global roles for Citi, covering all aspects of architecture, engineering, global operations, as well as running critical enterprise cyber services for Citi's cybersecurity functions. "Carl has a proven track record in building teams, systems architecture, large scale enterprise software implementation, as well as aligning processes and tools with business requirements and I believe he will play a key role in helping our company grow and scale," said Guy Caspi, CEO of Deep Instinct.

The role of Artificial Intelligence for the identification of cyber attacks


Spike Reply and IBM are organizing a webinar titled "The role of Artificial Intelligence for the identification of cyber attacks". The role of Artificial Intelligence is crucial for the evolution of digital services. This innovative technology finds many applications in the field of IT security. An example is the identification of cyber attacks which require an immediate response to actions that pose a risk to corporate data. The need to make decisions in the shortest possible time and the support of intelligence information are essential factors for an efficient and effective Incident Handling process.

Software Engineer III


We're on a mission to provide security teams with the intelligence they need to confront and stop advanced threats like supply chain attacks, zero day exploits, and ransomware attacks. Cyber attackers still have the advantage. Are you ready to help us reclaim the upper hand? Every day, banks, hospitals, government agencies, and entertainment companies rely on Extrahop's Reveal(x) a cloud-based machine learning cyber security platform to understand which users, devices and network activities they can trust. With this knowledge companies prevent fraud, data breaches, and can focus on building better user experiences, instead of worrying about security.

Five dating app dilemmas answered by experts

The Guardian

In an online wild west populated by scammers and hackers, dating apps pose challenges beyond just finding a partner. It's getting harder to tell if your date is who they say they are, and that's before you consider the data security and privacy implications of using the apps on your smartphone. It's difficult to maintain privacy when apps such as Hinge, Tinder and Bumble need to collect data to match you with potential dates. Then there's the data you share with other users – including your sexual orientation, age and social media information – that could put you at risk if it gets into the wrong hands. Here's what you need to know about using dating apps safely and privately, while still getting the most out of them.

Securing automated and connected vehicles in the age of hyper-connectivity


The world is experiencing interesting times with connected devices redefining how human beings interact with the ecosystem. In this context, innovation in the automotive industry is particularly noteworthy, with connected vehicles becoming equipped for varying degrees of autonomous driving. Their popularity will only continue to grow in the near future with an expected market size of $469 billion (Rs 36,61,952 crore) in 2030. To deliver the expected quality of service, modern connected vehicles mostly rely on cloud-based architecture built on 5G technology. Vehicular communication is enabled by Vehicle-to-Everything (V2X) technologies such as Cellular Vehicle-to-Everything (C-V2X) and Dedicated Short-Range Communication (DSRC) based on the IEEE 802.11p system, which aggregate information across network drop points.

Three opportunities of Digital Transformation: AI, IoT and Blockchain


Koomey's law This law posits that the energy efficiency of computation doubles roughly every one-and-a-half years (see Figure 1–7). In other words, the energy necessary for the same amount of computation halves in that time span. To visualize the exponential impact this has, consider the face that a fully charged MacBook Air, when applying the energy efficiency of computation of 1992, would completely drain its battery in a mere 1.5 seconds. According to Koomey's law, the energy requirements for computation in embedded devices is shrinking to the point that harvesting the required energy from ambient sources like solar power and thermal energy should suffice to power the computation necessary in many applications. Metcalfe's law This law has nothing to do with chips, but all to do with connectivity. Formulated by Robert Metcalfe as he invented Ethernet, the law essentially states that the value of a network increases exponentially with regard to the number of its nodes (see Figure 1–8).

How AI and bots strengthen endpoint security


We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Fast-growing ransomware, malware and endpoint-directed breach attempts are reordering the threat landscape in 2022. It's appropriate that RSA Conference 2022's theme is'transform,' as new threats continue to call for rapid changes in endpoint security. CISOs and CIOs are transforming their cloud infrastructure and hybrid cloud strategies, accelerating devops internally to produce new apps and platforms, and relying more on software-as-a-service (SaaS) apps than ever before to meet time-to-market goals. Vendors promoting cloud security, extended detection and response (XDR) and zero trust dominated RSAC 2022.

Wazuh and Its XDR Approach


Today's cyber security technological evolution milestones in the context of effective detection and response are the endpoint detection and response (EDR), Manage Detection and Response (MDR), and Network Detection and Response (NDR). However, these all solutions are running independently and missing the correlated high level processed alert to which Extended Detection and Response (XDR) is a solution that emerged, rather than adding another tool, XDR aims to change this security landscape and enable a more compelling activity of the security stack. What problem does XDR solve? Attackers often target endpoints, but they also target other layers of the IT domain in the corporate network, such as email servers and cloud systems, and they may bounce between layers or hide in the interface between them to evade detection. XDR solves both problems at once.