Goto

Collaborating Authors

Results


A Beginner's Guide to The Internet of Things (IoT) 2022

#artificialintelligence

We are able to turn on the lights in our homes from a desk in an office miles away. The built-in cameras and sensors embedded in our refrigerator let us easily keep tabs on what is present on the shelves, and when an item is close to expiration. When we get home, the thermostat has already adjusted the temperature so that it's lukewarm or brisk, depending on our preference. These are not examples from a futuristic science fiction story. These are only a few of the millions of frameworks part of the Internet of Things (IoT) being deployed today.


Fortify Cyber Defense With AI

#artificialintelligence

Organizations' attack surfaces are exponentially expanding, contributing to an unprecedented growth in cybersecurity risks. The internet of things, 5G, Wi-Fi 6, and other networking advances are driving an increase in network-connected devices that can be exploited by cybercriminals. For many employees, remote work is expected to remain the rule, not the exception, providing cybercriminals with many new opportunities. And as more organizations integrate data with third-party applications, APIs are a growing area of security concern. Expanding attack surfaces and the escalating severity and complexity of cyberthreats are exacerbated by a chronic shortage of cybersecurity talent.


Is ML-powered cyber security capable of lessening risk? Yes, with Vectra AI

#artificialintelligence

The dissemination of information cuts two ways. On the one hand, commerce is enabled, yet on the other, so too are the criminalized branches of commerce, and as a result, evolved ransomware is one of the most dangerous threats on the internet today. It's a low-cost, high-profit model -- and the threat is evolving to keep up with changes in how we work. Ransomware gangs and their associates are in the business of making money, have an ROI mindset. Groups and individuals learn new techniques, capitalising on their abilities to gain access to systems and data, and either steal, ransom-and-return, or just encrypt and charge.


The Four Ds: The Future of Business IoT

#artificialintelligence

Nope, we're not talking about Einsteinian physics or tesseracts, those theoretical four-dimensional objects that rotate, mind-bending, along two planes at once. These Four Ds are imminently practical, and they're already shaping the information infrastructure around which we build our businesses and reshaping the future of business IoT. Each of the Four Ds--as conceived by Asteria CEO Pina Hirano--is a pillar of a successful digital ecosystem, which is itself the platform on which tomorrow's businesses will stand or fall. As you explore these ideas, think about how they could apply to your operation--or the new business you're considering building atop this cutting-edge of information technology. With all due respect to spacetime and advanced mathematics, then, here are the Four Ds of the future that every business operator needs to master.


VPNs Are Crucial for Data Security on Public Wi-Fi

#artificialintelligence

Data security is a greater concern than ever before. There were 1,862 data breaches in 2021, which is a 20% increase from the previous record set in 2017. You have to take stringent measures to secure your data. This includes using a VPN whenever you connect to a public Wi-Fi network. The Internet plays an important role in everyone's lives these days.


Cybersecurity trends: Looking over the horizon

#artificialintelligence

Cybersecurity has always been a never-ending race, but the rate of change is accelerating. Companies are continuing to invest in technology to run their businesses. Now, they are layering more systems into their IT networks to support remote work, enhance the customer experience, and generate value, all of which creates potential new vulnerabilities. This article is a collaborative effort by Jim Boehm, Dennis Dias, Charlie Lewis, Kathleen Li, and Daniel Wallance, representing views from McKinsey's Risk & Resilience Practice. At the same time, adversaries--no longer limited to individual actors--include highly sophisticated organizations that leverage integrated tools and capabilities with artificial intelligence and machine learning. The scope of the threat is growing, and no organization is immune.


Information Security and Privacy

#artificialintelligence

Mobile Web/Mobile apps (for work) Cookies Search engines - everything you search is tracked Google mapping - location tracking malicious links and scams Bluetooth and wireless security and hot spots anti-virus software Security threats in collaborative activity - sharing features Social Media Blogging & personal web sites that are tied to work Using 3rd party applications Business Continuity Planning Responding to an emergency/mishap (virus attack/stolen laptop) Information classification (company-specific?) / Data Classification Policy Business Identity Theft Advertisements (check for searching competency) Equipping yourself for Data Recovery (backups/best practices) FTP/Network protocol/network security Organizational Independence Hard Drive/USBs


Technology Ethics in Action: Critical and Interdisciplinary Perspectives

arXiv.org Artificial Intelligence

This special issue interrogates the meaning and impacts of "tech ethics": the embedding of ethics into digital technology research, development, use, and governance. In response to concerns about the social harms associated with digital technologies, many individuals and institutions have articulated the need for a greater emphasis on ethics in digital technology. Yet as more groups embrace the concept of ethics, critical discourses have emerged questioning whose ethics are being centered, whether "ethics" is the appropriate frame for improving technology, and what it means to develop "ethical" technology in practice. This interdisciplinary issue takes up these questions, interrogating the relationships among ethics, technology, and society in action. This special issue engages with the normative and contested notions of ethics itself, how ethics has been integrated with technology across domains, and potential paths forward to support more just and egalitarian technology. Rather than starting from philosophical theories, the authors in this issue orient their articles around the real-world discourses and impacts of tech ethics--i.e., tech ethics in action.


Council Post: 16 Experts Predict The Tech Trends That Will Dominate Industry In 2022

#artificialintelligence

Tech trends can change on a dime--for example, the Covid-19 pandemic caused many companies to reactively switch their tech focus to enabling and supporting remote work. Still, industry watchers generally have insight into likely upcoming developments--they named cybersecurity and the Internet of Things as trends to watch in 2021, and there's no doubt these topics have generated plenty of headlines this year. The tech experts of Forbes Technology Council have their own predictions about the technologies and trends they believe will dominate not only the tech industry but business in general in the year ahead. From continued upgrades to artificial intelligence, voice search and battery technology to the rise of "citizen developers," here are their predictions and reasons for new and continuing tech trends in 2022. Members of Forbes Technology Council share their predictions for the tech trends that will dominate industry in 2022.


Leveraging AI to Optimize Networks and Secure Data – Thought Leaders

#artificialintelligence

Massive amounts of data are being generated daily; by some accounts, a staggering 2.5 quintillion bytes of data are being created every day. In today's world, proprietary data is one of the most valuable assets organizations have, it underpins the operations, identifying ways to improve processes and increase efficiencies, it provides insights into customer information, purchasing behavior and contains supply chain information. An organization's data is one of the most crucial elements of its business, and it must be protected. Unfortunately, humans alone can't possibly manage the volumes of data on their own. Aside from that, and more importantly and frightening is how much of an organization's data is left unmonitored, with the majority of networks unprotected.