Goto

Collaborating Authors

 security gap


AI, cyber terrain analytics improve hybrid multicloud security

#artificialintelligence

Typical hybrid cloud IT integration strategies have fundamental design flaws that CIOs and CISOs need to address if they're going to avert another attack on the scale of SolarWinds. The design flaws are evident in existing approaches to integrating public and private clouds with legacy systems. Inconsistent endpoint security and privileged access management has turned out to be highly penetrable and painfully lacking. The first two articles in this series explain how getting hybrid cloud security right is hard and how the SolarWinds hack exposed hybrid clouds' greatest weaknesses. This post lays out an approach to solve hybrid cloud security challenges today.


How artificial intelligence is powering cybersecurity

#artificialintelligence

Technology progresses daily and with this progression come threats and risks to social, financial and economic life. Today, cyber-attackers have resorted to the use of automation to launch more frequent attacks on different businesses and corporations. While cyber-attackers are expending a lot of resources to launch more sophisticated attacks, many organizations still rely on manual efforts to gather internal security findings and contextualize them with external threat information. It was reported that carelessness of employee was the reason behind the ransomware attack in 51 percent of the cases. However, such outdated methods and strategies need to part way for AI because they use up a lot of time, in which cyber-attackers can successfully take advantage of vulnerabilities to breach systems and steal data.


The Role of AI in Improving Data Security in the Coming Years

#artificialintelligence

AI has been the main topic of many tech reviews online. This is not coincidental as AI has improved numerous computer operations that were otherwise too complex for humans. One area of AI optimism is the ability of Artificial Intelligence and Machine Learning to improve the lives of people by dealing with intricacies and inadequacies. The promise of AI is sometimes compared to the advancement of mobile computing. This is true as mobile devices have been on the rise in the past decades.


How to close the AI security gap - IoT Now Transport

#artificialintelligence

As we hand data and control over to the machines for autonomous driving, even if Artificial Intelligence (AI) is still rudimentary, how can businesses maintain proper security controls, asks Andrew Foxcroft, regional director, Radware? Apple recently found itself in the shoes of many other organisations when it discovered that a former employee, working in the tech giant's autonomous vehicle development team, had stolen trade secrets. The hardware engineer planned to take the data and join an intelligent electric vehicle start-up, but his plot was foiled after internal investigators noticed a spike in his network activity. Cases like this are common – in fact, some 30% of CXOs say that insider threats put their companies' security and IP at risk. The act of stealing data shows the competitive nature of being first to launch new technology.